[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Fedora] SQL Injection Schwachstelle in Ruby on Rails vor Version 2.1.1 - FEDORA-2008-8282



-----BEGIN PGP SIGNED MESSAGE-----

Liebe Kolleginnen und Kollegen,

soeben erreichte uns nachfolgendes Fedora Security Advisory. Wir geben
diese Informationen unveraendert an Sie weiter.

CVE-2008-4094 - SQL Injection Schwachstelle in Ruby on Rails vor Version
2.1.1

  Ruby on Rails weist eine Schwachstelle auf, welche SQL Injection
  ermoeglicht. Die beiden Parameter ':offset' und ':limit' werden beim
  Generieren von SQL-Statements nicht ausreichend ueberprueft, was es
  ermoeglicht, SQL-Statements in die Anwendung einzuschleusen. Ein
  Angreifer kann diese Schwachstelle ausnutzen, um im Datenbanksystem
  Befehle mit den Rechten der Anwendung auszufuehren.

Betroffen sind die folgenden Software Pakete und Plattformen:

  Paket rubygem-actionmailer, rubygem-actionpack, rubygem-activerecord,
  rubygem-activeresource, rubygem-activesupport, rubygem-rails, rubygems

  Fedora 8

Vom Hersteller werden ueberarbeitete Pakete zur Verfuegung gestellt.

Hersteller Advisory:
  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00322.html
  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00404.html
  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00402.html
  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00323.html
  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00405.html
  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00403.html
  https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00406.html


(c) der deutschen Zusammenfassung bei DFN-CERT Services GmbH; die
Verbreitung, auch auszugsweise, ist nur unter Hinweis auf den Urheber,
DFN-CERT Services GmbH, und nur zu nicht kommerziellen Zwecken
gestattet.

Mit freundlichen Gruessen,
   Michael Groening, DFN-CERT
- -- 

Michael Groening (Incident Response Team), +49 40 808077-555

DFN-CERT Services GmbH, https://www.dfn-cert.de,  Phone  +49 40 808077-555
Sitz / Register: Hamburg, AG Hamburg, HRB 88805,  Ust-IdNr.:  DE 232129737
Sachsenstrasse 5, 20097 Hamburg/Germany,  CEO: Dr. Klaus-Peter Kossakowski

Automatische Warnmeldungen                https://www.cert.dfn.de/autowarn


- --------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-8282
2008-10-16 00:40:13
- --------------------------------------------------------------------------------

Name        : rubygem-actionmailer
Product     : Fedora 8
Version     : 2.1.1
Release     : 1.fc8
URL         : http://www.rubyonrails.org
Summary     : Service layer for easy email delivery and testing
Description :
Makes it trivial to test and deliver emails sent from a single service layer.

- --------------------------------------------------------------------------------
Update Information:

Fixes CVE-2008-4094 (SQL injection in limit and offset clauses)
- --------------------------------------------------------------------------------
ChangeLog:

* Tue Sep 16 2008 David Lutterkort <dlutter@xxxxxxxxxx> - 2.1.1-1
- - New version (fixes CVE-2008-4094)
* Thu Jul 31 2008 Michael Stahnke <stahnma@xxxxxxxxxxxxxxxxx> - 2.1.0-1
- - New Upstream
- --------------------------------------------------------------------------------
References:

  [ 1 ] Bug #462302 - CVE-2008-4094 Security: rubygem-rails 2.1.1 is available, please update
        https://bugzilla.redhat.com/show_bug.cgi?id=462302
  [ 2 ] Bug #462303 - CVE-2008-4094 Security: rubygem-actionmailer 2.1.1 is available, please update
        https://bugzilla.redhat.com/show_bug.cgi?id=462303
  [ 3 ] Bug #462304 - CVE-2008-4094 Security: rubygem-actionpack 2.1.1 is available, please update
        https://bugzilla.redhat.com/show_bug.cgi?id=462304
  [ 4 ] Bug #462306 - CVE-2008-4094 Security: rubygem-activerecord 2.1.1 is available, please update
        https://bugzilla.redhat.com/show_bug.cgi?id=462306
  [ 5 ] Bug #462307 - CVE-2008-4094 Security: rubygem-activeresource 2.1.1 is available, please update
        https://bugzilla.redhat.com/show_bug.cgi?id=462307
  [ 6 ] Bug #462308 - CVE-2008-4094 Security: rubygem-activesupport 2.1.1 is available, please update
        https://bugzilla.redhat.com/show_bug.cgi?id=462308
- --------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update rubygem-actionmailer' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
- --------------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBSPhzTEhXCWfrVVdXAQFoTQgAgNAAb/dPXa3n6SXaQG8jDssQWRpAfEg6
X0T91lJcZwgH61vM6iUpGj8JgPG0jFNJAEaIYCW/+hzGGEHY6I7KbGPHVJlkGsMy
R/E+eAFVwDn3XjQDkBK9tlKTdkhT58NFomZLsLx37vbtwUvroSfPjl4HtDgbEKtq
sdhMMtSiLvjJVvrpvLdMTVLxRVe0G4GZf0soikFyWS2ISCqpDOlB8if3UVrmL0E3
81ptZOrg1OpXrvXzWtfLUo2r9JTvma9tYH+P84O4dERo6j4juVkpErcUmNKodcy1
oHHHdyt7tET/2OSgnJsiydubUcxKscuwfu/wkiAqDwdlDgetsZLqkA==
=kxW+
-----END PGP SIGNATURE-----