CVE-2014-2734

The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations.  NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
VendorProductVersion
ruby-langruby
2.0
ruby-langruby
2.0.0
ruby-langruby
2.0.0:p0
ruby-langruby
2.0.0:p195
ruby-langruby
2.0.0:p247
ruby-langruby
2.0.0:preview1
ruby-langruby
2.0.0:preview2
ruby-langruby
2.0.0:rc1
ruby-langruby
2.0.0:rc2
ruby-langruby
2.1
ruby-langruby
2.1:preview1
ruby-langruby
2.1.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby1.8
trusty
dne
saucy
ignored
quantal
ignored
precise
ignored
lucid
ignored
ruby1.9
trusty
dne
saucy
dne
quantal
dne
precise
dne
lucid
ignored
ruby1.9.1
trusty
dne
saucy
ignored
quantal
ignored
precise
ignored
lucid
ignored
ruby2.0
trusty
dne
saucy
ignored
quantal
dne
precise
dne
lucid
dne
Common Weakness Enumeration