rubygems <2.4.8 vulnerable to DNS request hijacking (CVE-2015-3900 and CVE-2015-4020)

134 views
Skip to first unread message

Reed Loden

unread,
Jun 26, 2015, 4:57:03 PM6/26/15
to rubysec-announce, ruby-sec...@googlegroups.com, oss-se...@lists.openwall.com
A bit old news, but I didn't see anybody post about this, so figured I'd pass it on so folks know to update. Haven't seen updates by the distros either.

MITRE's summary (updated):
"""
RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API request, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
"""

References:
* https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
* http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html
* http://blog.rubygems.org/2015/06/08/2.4.8-released.html
* http://blog.rubygems.org/2015/06/08/2.2.5-released.html
* https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356

postmodern

unread,
Jun 26, 2015, 6:36:16 PM6/26/15
to ruby-sec...@googlegroups.com
Here is the RedHat/Fedora bugzilla link:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-3900
--
Blog: http://postmodern.github.com/
GitHub: https://github.com/postmodern
Twitter: @postmodern_mod3
PGP: 0xB9515E77


signature.asc
Reply all
Reply to author
Forward
0 new messages