2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2008-3443" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2008-08-14T23:41:00.000" ,
2025-04-09 02:05:49 +00:00
"lastModified" : "2025-04-09T00:30:58.490" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick."
} ,
{
"lang" : "es" ,
"value" : "El motor de expresiones regulares (regex.c) en Ruby 1.8.5 y anteriores, 1.8.6 a trav\u00e9s de p286-1.8.6, 1.8.7 a trav\u00e9s de 1.8.7-p71, y 1.9 a trav\u00e9s de r18423 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito y caida) a trav\u00e9s de m\u00faltiples peticiones largas a un socket de Ruby. Esta denegaci\u00f3n de servicio esta relacionada con un fallo en la asignaci\u00f3n de memoria, como se ha demostrado contra Webrick."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-399"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "46086C6A-9068-4959-BEE7-4D76BDEA3962"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16BDFA5C-35BE-4B7E-BD2D-C28B095F62E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "31160797-6920-4BA1-B355-1CCD1FCDBFC8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC306E85-66D8-4384-BBC3-92DC99C85FC2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A5675C37-39EF-41EF-9A53-3FCE4CF23820"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*" ,
"matchCriteriaId" : "39609530-0A81-481E-BDA4-5A98327EAD11"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*" ,
"matchCriteriaId" : "C19ADE91-4D9E-43ED-A605-E504B9090119"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*" ,
"matchCriteriaId" : "D89E3027-C2ED-4CC6-86F5-1B791576B6EF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "46F29ADA-E6DC-456F-9E63-C56C68EF7E5C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*" ,
"matchCriteriaId" : "57B1C113-682E-4F7D-BCF0-E30C446C4AC7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*" ,
"matchCriteriaId" : "4BAF9471-B532-4194-AB3C-5AA28432FF27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*" ,
"matchCriteriaId" : "51BE9728-A5FE-486A-8DB9-711E46243132"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7AC1B910-C0FA-4943-92B1-597842E84015"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*" ,
"matchCriteriaId" : "A78ECCA9-6F07-4A63-8BF7-8D40F2439552"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*" ,
"matchCriteriaId" : "14513719-4ED8-4EAB-B4D8-29849B868BA0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*" ,
"matchCriteriaId" : "92E3814D-BEEA-4E46-9CED-9D8059727D14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C80BDE13-9CBB-4A5F-9BF4-BEB907CED271"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA7D3F32-EFB7-4628-9328-36C6A306B399"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*" ,
"matchCriteriaId" : "D1A95E9F-AEC5-4AF9-B7D9-52DDDECB7E77"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:p114:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C72828E-B572-470B-ACA6-55C34DBAA017"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*" ,
"matchCriteriaId" : "9328DE73-420B-4280-85A4-ABEFC4679676"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F382FBD-6163-4A5B-AEB3-A15A843329F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "4399121F-9BC7-4A67-8B0B-ED3B94A16D56"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:p231:*:*:*:*:*:*" ,
"matchCriteriaId" : "736348AD-4717-477B-BE8C-A0CAB37F3461"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*" ,
"matchCriteriaId" : "BFE61EB9-2544-4E48-B313-63A99F4F5241"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:p52:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FA7A250-A388-4749-ABC0-06B02DBC3915"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*" ,
"matchCriteriaId" : "6122187F-2371-429A-971B-419B4ACE8E18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A42425D-FF21-4863-B43D-EE100DBE6BD7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*" ,
"matchCriteriaId" : "06512108-020D-4D71-8F60-6AA2052D7D35"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2E152A5-F625-4061-AD8C-4CFA085B674F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*" ,
"matchCriteriaId" : "756F5247-658C-412C-ACBF-CBE987DF748A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "876B2575-4F81-4A70-9A88-9BEE44649626"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*" ,
"matchCriteriaId" : "DF02372D-FD0B-453F-821E-1E0BA7900711"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A6ED369-E564-4D4F-9E23-A8125194EAD0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*" ,
"matchCriteriaId" : "ACC0DB90-C072-4BCB-9082-94394F547D35"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*" ,
"matchCriteriaId" : "4D7ED62B-4D88-46A4-A0A3-BD37E66A5211"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*" ,
"matchCriteriaId" : "072A0C3C-9F47-4DC7-96EA-7980B45429DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB0372E4-FE3E-49CD-AF55-E2E4518D34F5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*" ,
"matchCriteriaId" : "04579340-B53F-47B5-99C9-B647AAA3D303"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D7F4162-108A-470B-8E6B-C009E8C56AEF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*" ,
"matchCriteriaId" : "73AB0545-3D8D-4623-8381-D71DA44E3B5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D86FC99-3521-4E22-8FD3-65CEB05A6342"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*" ,
"matchCriteriaId" : "84A291B0-EABD-4572-B8E2-2457DBAEDC92"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FE05F3A-A8B5-45EE-BF52-D55E2768F890"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C6D66E2-3E10-4DEA-9E6B-53A5DE78AFCF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E37786B-5336-4182-A1E3-801BDB6F61EC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*" ,
"matchCriteriaId" : "349D014E-223A-46A7-8334-543DB330C215"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*" ,
"matchCriteriaId" : "550EC183-43A1-4A63-A23C-A48C1F078451"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*" ,
"matchCriteriaId" : "0ACECF59-AA88-4B5C-A671-83842C9CF072"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "52179EC7-CAF0-42AA-A21A-7105E10CA122"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*" ,
"matchCriteriaId" : "D906EA97-7071-4CFA-84EF-EC82D813D7AE"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/31430" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/32165" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/32219" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/32371" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/32372" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/33185" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/33398" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/35074" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securityreason.com/securityalert/4158" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://support.apple.com/kb/HT3549" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.debian.org/security/2009/dsa-1695" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0895.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0897.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/30682" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securitytracker.com/id?1021075" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1297" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44688" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9570" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://usn.ubuntu.com/651-1/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://usn.ubuntu.com/691-1/" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.exploit-db.com/exploits/6239" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html" ,
"source" : "cve@mitre.org"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/31430" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/32165" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/32219" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/32371" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/32372" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/33185" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/33398" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/35074" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securityreason.com/securityalert/4158" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://support.apple.com/kb/HT3549" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.debian.org/security/2009/dsa-1695" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0895.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0897.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/30682" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securitytracker.com/id?1021075" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/1297" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44688" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9570" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://usn.ubuntu.com/651-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://usn.ubuntu.com/691-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.exploit-db.com/exploits/6239" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}