CVE-2014-2734

EUVD-2014-2762
The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations.  NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
ruby-langruby
2.0
ruby-langruby
2.0.0
ruby-langruby
2.0.0:p0
ruby-langruby
2.0.0:p195
ruby-langruby
2.0.0:p247
ruby-langruby
2.0.0:preview1
ruby-langruby
2.0.0:preview2
ruby-langruby
2.0.0:rc1
ruby-langruby
2.0.0:rc2
ruby-langruby
2.1
ruby-langruby
2.1:preview1
ruby-langruby
2.1.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby1.8
lucid
ignored
precise
ignored
quantal
ignored
saucy
ignored
trusty
dne
ruby1.9
lucid
ignored
precise
dne
quantal
dne
saucy
dne
trusty
dne
ruby1.9.1
lucid
ignored
precise
ignored
quantal
ignored
saucy
ignored
trusty
dne
ruby2.0
lucid
dne
precise
dne
quantal
dne
saucy
ignored
trusty
dne
Common Weakness Enumeration