CVE-2015-3900

RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
References
Link Resource
http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html Patch Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html
http://rhn.redhat.com/errata/RHSA-2015-1657.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/06/26/2 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Third Party Advisory
http://www.securityfocus.com/bid/75482
https://puppet.com/security/cve/CVE-2015-3900
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356 Third Party Advisory
https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/ Third Party Advisory
http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html Patch Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html
http://rhn.redhat.com/errata/RHSA-2015-1657.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/06/26/2 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Third Party Advisory
http://www.securityfocus.com/bid/75482
https://puppet.com/security/cve/CVE-2015-3900
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356 Third Party Advisory
https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1:-:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.2.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:rubygems:rubygems:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.6:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:30

Type Values Removed Values Added
References () http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html - Patch, Vendor Advisory () http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html - Patch, Vendor Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html -
References () http://rhn.redhat.com/errata/RHSA-2015-1657.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-1657.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/06/26/2 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/06/26/2 - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory
References () http://www.securityfocus.com/bid/75482 - () http://www.securityfocus.com/bid/75482 -
References () https://puppet.com/security/cve/CVE-2015-3900 - () https://puppet.com/security/cve/CVE-2015-3900 -
References () https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356 - Third Party Advisory () https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356 - Third Party Advisory
References () https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/ - Third Party Advisory () https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/ - Third Party Advisory

Information

Published : 2015-06-24 14:59

Updated : 2024-11-21 02:30


NVD link : CVE-2015-3900

Mitre link : CVE-2015-3900

CVE.ORG link : CVE-2015-3900


JSON object : View

Products Affected

redhat

  • enterprise_linux

rubygems

  • rubygems

oracle

  • solaris

ruby-lang

  • ruby
CWE
CWE-254

7PK - Security Features