Description
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Published: 2008-08-13
Score: 7.5 High
EPSS: 29.7% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1651-1 New ruby1.8 packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1652-1 New ruby1.9 packages fix several vulnerabilities
Ubuntu USN Ubuntu USN USN-651-1 Ruby vulnerabilities
References
Link Providers
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html cve-icon cve-icon
http://secunia.com/advisories/31430 cve-icon cve-icon
http://secunia.com/advisories/31697 cve-icon cve-icon
http://secunia.com/advisories/32165 cve-icon cve-icon
http://secunia.com/advisories/32219 cve-icon cve-icon
http://secunia.com/advisories/32255 cve-icon cve-icon
http://secunia.com/advisories/32256 cve-icon cve-icon
http://secunia.com/advisories/32371 cve-icon cve-icon
http://secunia.com/advisories/32372 cve-icon cve-icon
http://secunia.com/advisories/33178 cve-icon cve-icon
http://secunia.com/advisories/35074 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200812-17.xml cve-icon cve-icon
http://support.apple.com/kb/HT3549 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm cve-icon cve-icon
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1651 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1652 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0895.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0897.html cve-icon cve-icon
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/ cve-icon cve-icon
http://www.securityfocus.com/archive/1/495884/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/30644 cve-icon cve-icon
http://www.securitytracker.com/id?1020656 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA09-133A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2334 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1297 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/44369 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-3655 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602 cve-icon cve-icon
https://usn.ubuntu.com/651-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-3655 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html cve-icon cve-icon
History

No history.

Subscriptions

Redhat Enterprise Linux
Ruby-lang Ruby
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T09:45:18.972Z

Reserved: 2008-08-12T00:00:00.000Z

Link: CVE-2008-3655

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-08-13T01:41:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-3655

cve-icon Redhat

Severity : Moderate

Publid Date: 2008-08-08T00:00:00Z

Links: CVE-2008-3655 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses