RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2015-1657.html | third party advisory vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2015/06/26/2 | third party advisory mailing list |
https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/ | third party advisory |
http://www.securityfocus.com/bid/75482 | vdb entry |
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356 | third party advisory |
http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html | patch vendor advisory |
https://puppet.com/security/cve/CVE-2015-3900 | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html | vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | third party advisory |