Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html | Mailing List Third Party Advisory |
http://www.debian.org/security/2014/dsa-2887 | Third Party Advisory |
http://www.debian.org/security/2014/dsa-2888 | Third Party Advisory |
https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ | Broken Link Exploit |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
19 May 2023, 16:52
Type | Values Removed | Values Added |
---|---|---|
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ - Broken Link, Exploit | |
References | (DEBIAN) http://www.debian.org/security/2014/dsa-2887 - Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2014/dsa-2888 - Third Party Advisory | |
CPE | cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:* |
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* |
Information
Published : 2013-10-17 00:55
Updated : 2024-02-04 18:16
NVD link : CVE-2013-4389
Mitre link : CVE-2013-4389
CVE.ORG link : CVE-2013-4389
JSON object : View
Products Affected
debian
- debian_linux
rubyonrails
- rails
opensuse
- opensuse
CWE
CWE-134
Use of Externally-Controlled Format String