CVE-2017-17790

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.5.0:preview1:*:*:*:*:*:*

History

21 Nov 2024, 03:18

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:0378 - () https://access.redhat.com/errata/RHSA-2018:0378 -
References () https://access.redhat.com/errata/RHSA-2018:0583 - () https://access.redhat.com/errata/RHSA-2018:0583 -
References () https://access.redhat.com/errata/RHSA-2018:0584 - () https://access.redhat.com/errata/RHSA-2018:0584 -
References () https://access.redhat.com/errata/RHSA-2018:0585 - () https://access.redhat.com/errata/RHSA-2018:0585 -
References () https://github.com/ruby/ruby/pull/1777 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/ruby/ruby/pull/1777 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html - () https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html -
References () https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html - () https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html -
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html -
References () https://www.debian.org/security/2018/dsa-4259 - () https://www.debian.org/security/2018/dsa-4259 -

Information

Published : 2017-12-20 09:29

Updated : 2024-11-21 03:18


NVD link : CVE-2017-17790

Mitre link : CVE-2017-17790

CVE.ORG link : CVE-2017-17790


JSON object : View

Products Affected

ruby-lang

  • ruby
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')