Description
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
Published: 2008-08-13
Score: 7.5 High
EPSS: 22.5% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1651-1 New ruby1.8 packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1652-1 New ruby1.9 packages fix several vulnerabilities
Ubuntu USN Ubuntu USN USN-651-1 Ruby vulnerabilities
References
Link Providers
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html cve-icon cve-icon
http://secunia.com/advisories/31430 cve-icon cve-icon
http://secunia.com/advisories/31697 cve-icon cve-icon
http://secunia.com/advisories/32165 cve-icon cve-icon
http://secunia.com/advisories/32219 cve-icon cve-icon
http://secunia.com/advisories/32255 cve-icon cve-icon
http://secunia.com/advisories/32256 cve-icon cve-icon
http://secunia.com/advisories/32371 cve-icon cve-icon
http://secunia.com/advisories/33178 cve-icon cve-icon
http://secunia.com/advisories/35074 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200812-17.xml cve-icon cve-icon
http://support.apple.com/kb/HT3549 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm cve-icon cve-icon
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1651 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1652 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0897.html cve-icon cve-icon
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/ cve-icon cve-icon
http://www.securityfocus.com/archive/1/495884/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/30644 cve-icon cve-icon
http://www.securitytracker.com/id?1020652 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA09-133A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2334 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1297 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/44372 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-3657 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9793 cve-icon cve-icon
https://usn.ubuntu.com/651-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-3657 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html cve-icon cve-icon
History

No history.

Subscriptions

Redhat Enterprise Linux
Ruby-lang Ruby
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T09:45:19.245Z

Reserved: 2008-08-12T00:00:00.000Z

Link: CVE-2008-3657

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-08-13T01:41:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-3657

cve-icon Redhat

Severity : Low

Publid Date: 2008-08-08T00:00:00Z

Links: CVE-2008-3657 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses