A vulnerability was found where rubygems did not sanitize DNS responses when requesting the hostname of the rubygems server for a domain, via a _rubygems._tcp DNS SRV query. An attacker with the ability to manipulate DNS responses could direct the gem command towards a different domain.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | ruby22 | 2017-10-02 17:01 | ALAS-2017-906 |
Amazon Linux 1 | ruby23 | 2017-10-02 17:01 | ALAS-2017-906 |
Amazon Linux 1 | ruby24 | 2017-10-26 17:01 | ALAS-2017-915 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
NVD | CVSSv2 | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |
NVD | CVSSv3 | 8.1 | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |