CVE-2006-6303
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-399
Error en la gestión de recursos
Fecha de publicación:
06/12/2006
Última modificación:
09/04/2025
Descripción
La función read_multipart en cgi.rb de Ruby anterior a 1.8.5-p2 no detecta adecuadamente los límites en contenido MIME multipart, lo cual permite a atacantes remotos provocar una denegación de servicio (bucle infinito) mediante una petición HTTP artesanal, un asunto diferente que CVE-2006-5467.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.2_pre1:*:*:*:*:*:*:* | ||
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.2_pre2:*:*:*:*:*:*:* | ||
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.5:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugs.gentoo.org/show_bug.cgi?id=157048
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218287
- http://docs.info.apple.com/article.html?artnum=305530
- http://jvn.jp/jp/JVN%2384798830/index.html
- http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
- http://secunia.com/advisories/23165
- http://secunia.com/advisories/23268
- http://secunia.com/advisories/23454
- http://secunia.com/advisories/25402
- http://secunia.com/advisories/27576
- http://secunia.com/advisories/31090
- http://security.gentoo.org/glsa/glsa-200612-21.xml
- http://securitytracker.com/id?1017363=
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A225
- http://www.novell.com/linux/security/advisories/2007_4_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0961.html
- http://www.ruby-lang.org/cgi-bin/cvsweb.cgi/ruby/lib/cgi.rb.diff?f=h&only_with_tag=MAIN&r1=text&tr1=1.92&r2=text&tr2=1.91
- http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library/
- http://www.securityfocus.com/bid/21441
- http://www.ubuntu.com/usn/usn-394-1
- http://www.vupen.com/english/advisories/2006/4855
- http://www.vupen.com/english/advisories/2007/1939
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30734
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10529
- http://bugs.gentoo.org/show_bug.cgi?id=157048
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218287
- http://docs.info.apple.com/article.html?artnum=305530
- http://jvn.jp/jp/JVN%2384798830/index.html
- http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
- http://secunia.com/advisories/23165
- http://secunia.com/advisories/23268
- http://secunia.com/advisories/23454
- http://secunia.com/advisories/25402
- http://secunia.com/advisories/27576
- http://secunia.com/advisories/31090
- http://security.gentoo.org/glsa/glsa-200612-21.xml
- http://securitytracker.com/id?1017363=
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A225
- http://www.novell.com/linux/security/advisories/2007_4_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0961.html
- http://www.ruby-lang.org/cgi-bin/cvsweb.cgi/ruby/lib/cgi.rb.diff?f=h&only_with_tag=MAIN&r1=text&tr1=1.92&r2=text&tr2=1.91
- http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library/
- http://www.securityfocus.com/bid/21441
- http://www.ubuntu.com/usn/usn-394-1
- http://www.vupen.com/english/advisories/2006/4855
- http://www.vupen.com/english/advisories/2007/1939
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30734
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10529