CVE-2006-3694

Multiple unspecified vulnerabilities in Ruby before 1.8.5 allow remote attackers to bypass "safe level" checks via unspecified vectors involving (1) the alias function and (2) "directory operations".
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P
http://jvn.jp/jp/JVN%2313947696/index.html
http://jvn.jp/jp/JVN%2383768862/index.html
http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003907.html
http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003915.html
http://secunia.com/advisories/21009 Patch Vendor Advisory
http://secunia.com/advisories/21233 Patch Vendor Advisory
http://secunia.com/advisories/21236 Patch Vendor Advisory
http://secunia.com/advisories/21272 Patch Vendor Advisory
http://secunia.com/advisories/21337 Patch Vendor Advisory
http://secunia.com/advisories/21598
http://secunia.com/advisories/21657
http://secunia.com/advisories/21749
http://www.debian.org/security/2006/dsa-1139 Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1157
http://www.mandriva.com/security/advisories?name=MDKSA-2006:134
http://www.novell.com/linux/security/advisories/2006_21_sr.html
http://www.osvdb.org/27144
http://www.osvdb.org/27145
http://www.redhat.com/support/errata/RHSA-2006-0604.html Patch Vendor Advisory
http://www.securityfocus.com/bid/18944 Patch
http://www.ubuntu.com/usn/usn-325-1 Patch
http://www.vupen.com/english/advisories/2006/2760
https://exchange.xforce.ibmcloud.com/vulnerabilities/27725
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9983
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P
http://jvn.jp/jp/JVN%2313947696/index.html
http://jvn.jp/jp/JVN%2383768862/index.html
http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003907.html
http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003915.html
http://secunia.com/advisories/21009 Patch Vendor Advisory
http://secunia.com/advisories/21233 Patch Vendor Advisory
http://secunia.com/advisories/21236 Patch Vendor Advisory
http://secunia.com/advisories/21272 Patch Vendor Advisory
http://secunia.com/advisories/21337 Patch Vendor Advisory
http://secunia.com/advisories/21598
http://secunia.com/advisories/21657
http://secunia.com/advisories/21749
http://www.debian.org/security/2006/dsa-1139 Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1157
http://www.mandriva.com/security/advisories?name=MDKSA-2006:134
http://www.novell.com/linux/security/advisories/2006_21_sr.html
http://www.osvdb.org/27144
http://www.osvdb.org/27145
http://www.redhat.com/support/errata/RHSA-2006-0604.html Patch Vendor Advisory
http://www.securityfocus.com/bid/18944 Patch
http://www.ubuntu.com/usn/usn-325-1 Patch
http://www.vupen.com/english/advisories/2006/2760
https://exchange.xforce.ibmcloud.com/vulnerabilities/27725
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9983
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:14

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P -
References () http://jvn.jp/jp/JVN%2313947696/index.html - () http://jvn.jp/jp/JVN%2313947696/index.html -
References () http://jvn.jp/jp/JVN%2383768862/index.html - () http://jvn.jp/jp/JVN%2383768862/index.html -
References () http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003907.html - () http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003907.html -
References () http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003915.html - () http://lists.freebsd.org/pipermail/freebsd-security/2006-July/003915.html -
References () http://secunia.com/advisories/21009 - Patch, Vendor Advisory () http://secunia.com/advisories/21009 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21233 - Patch, Vendor Advisory () http://secunia.com/advisories/21233 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21236 - Patch, Vendor Advisory () http://secunia.com/advisories/21236 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21272 - Patch, Vendor Advisory () http://secunia.com/advisories/21272 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21337 - Patch, Vendor Advisory () http://secunia.com/advisories/21337 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21598 - () http://secunia.com/advisories/21598 -
References () http://secunia.com/advisories/21657 - () http://secunia.com/advisories/21657 -
References () http://secunia.com/advisories/21749 - () http://secunia.com/advisories/21749 -
References () http://www.debian.org/security/2006/dsa-1139 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1139 - Patch, Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1157 - () http://www.debian.org/security/2006/dsa-1157 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:134 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:134 -
References () http://www.novell.com/linux/security/advisories/2006_21_sr.html - () http://www.novell.com/linux/security/advisories/2006_21_sr.html -
References () http://www.osvdb.org/27144 - () http://www.osvdb.org/27144 -
References () http://www.osvdb.org/27145 - () http://www.osvdb.org/27145 -
References () http://www.redhat.com/support/errata/RHSA-2006-0604.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0604.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/18944 - Patch () http://www.securityfocus.com/bid/18944 - Patch
References () http://www.ubuntu.com/usn/usn-325-1 - Patch () http://www.ubuntu.com/usn/usn-325-1 - Patch
References () http://www.vupen.com/english/advisories/2006/2760 - () http://www.vupen.com/english/advisories/2006/2760 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27725 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27725 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9983 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9983 -

Information

Published : 2006-07-21 14:03

Updated : 2024-11-21 00:14


NVD link : CVE-2006-3694

Mitre link : CVE-2006-3694

CVE.ORG link : CVE-2006-3694


JSON object : View

Products Affected

yukihiro_matsumoto

  • ruby