CVE-2014-2734 (GCVE-0-2014-2734)
Vulnerability from cvelistv5
Published
2014-04-24 23:00
Modified
2024-08-06 10:21
Severity ?
CWE
  • n/a
Summary
The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher
References
cve@mitre.org http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html Exploit
cve@mitre.org http://seclists.org/fulldisclosure/2014/Apr/231 Exploit
cve@mitre.org http://seclists.org/fulldisclosure/2014/May/13
cve@mitre.org http://www.osvdb.org/106006
cve@mitre.org http://www.securityfocus.com/bid/66956
cve@mitre.org https://gist.github.com/10446549
cve@mitre.org https://gist.github.com/emboss/91696b56cd227c8a0c13
cve@mitre.org https://github.com/adrienthebo/cve-2014-2734/
cve@mitre.org https://news.ycombinator.com/item?id=7601973
cve@mitre.org https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/
af854a3a-2127-422b-91ae-364da2661108 http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html Exploit
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2014/Apr/231 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2014/May/13
af854a3a-2127-422b-91ae-364da2661108 http://www.osvdb.org/106006
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/66956
af854a3a-2127-422b-91ae-364da2661108 https://gist.github.com/10446549
af854a3a-2127-422b-91ae-364da2661108 https://gist.github.com/emboss/91696b56cd227c8a0c13
af854a3a-2127-422b-91ae-364da2661108 https://github.com/adrienthebo/cve-2014-2734/
af854a3a-2127-422b-91ae-364da2661108 https://news.ycombinator.com/item?id=7601973
af854a3a-2127-422b-91ae-364da2661108 https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:21:36.074Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html"
          },
          {
            "name": "106006",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/106006"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://news.ycombinator.com/item?id=7601973"
          },
          {
            "name": "66956",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/66956"
          },
          {
            "name": "20140502 Re: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/May/13"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gist.github.com/10446549"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gist.github.com/emboss/91696b56cd227c8a0c13"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/adrienthebo/cve-2014-2734/"
          },
          {
            "name": "20140416 Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Apr/231"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations.  NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-11-15T19:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html"
        },
        {
          "name": "106006",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/106006"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://news.ycombinator.com/item?id=7601973"
        },
        {
          "name": "66956",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/66956"
        },
        {
          "name": "20140502 Re: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/May/13"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gist.github.com/10446549"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gist.github.com/emboss/91696b56cd227c8a0c13"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/adrienthebo/cve-2014-2734/"
        },
        {
          "name": "20140416 Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Apr/231"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-2734",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations.  NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html"
            },
            {
              "name": "106006",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/106006"
            },
            {
              "name": "https://news.ycombinator.com/item?id=7601973",
              "refsource": "MISC",
              "url": "https://news.ycombinator.com/item?id=7601973"
            },
            {
              "name": "66956",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/66956"
            },
            {
              "name": "20140502 Re: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/May/13"
            },
            {
              "name": "https://gist.github.com/10446549",
              "refsource": "MISC",
              "url": "https://gist.github.com/10446549"
            },
            {
              "name": "https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/",
              "refsource": "MISC",
              "url": "https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/"
            },
            {
              "name": "https://gist.github.com/emboss/91696b56cd227c8a0c13",
              "refsource": "MISC",
              "url": "https://gist.github.com/emboss/91696b56cd227c8a0c13"
            },
            {
              "name": "https://github.com/adrienthebo/cve-2014-2734/",
              "refsource": "MISC",
              "url": "https://github.com/adrienthebo/cve-2014-2734/"
            },
            {
              "name": "20140416 Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/Apr/231"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-2734",
    "datePublished": "2014-04-24T23:00:00",
    "dateReserved": "2014-04-08T00:00:00",
    "dateUpdated": "2024-08-06T10:21:36.074Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-2734\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-04-24T23:55:05.707\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[{\"sourceIdentifier\":\"cve@mitre.org\",\"tags\":[\"disputed\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations.  NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher\"},{\"lang\":\"es\",\"value\":\"** DISPUTADA ** La extensi\u00f3n openssl en Ruby 2.x no mantiene correctamente el estado de la memoria de procesos despu\u00e9s de la reapertura de un fichero, lo que permite a atacantes remotos falsificar firmas dentro del contexto de una secuencia de comandos Ruby que intenta la verificaci\u00f3n de firmas despu\u00e9s de realizar cierta secuencia de operaciones del sistema de ficheros. NOTA: este problema ha sido disputado por el equipo OpenSSL de Ruby y terceras partes, que dicen que la demostraci\u00f3n PoC original contiene errores y c\u00f3digo redundante o innecesariamente complejo que no parece estar relacionado con una demostraci\u00f3n del problema. Desde 02052014, CVE no est\u00e1 consciente de ning\u00fan comentario p\u00fablico por parte del investigador original.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90E0471D-1323-4E67-B66C-DEBF3BBAEEAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03B7561-A854-4EFA-9E4E-CFC4EEAE4EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2423B85-0971-42AC-8B64-819008BC5778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C663278-3B2A-4B7C-959A-2AA804467F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7927149-A76A-48BC-8405-7375FC7D7486\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB116A84-1652-4F5D-98AC-81F0349EEDC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*\",\"matchCriteriaId\":\"259C21E7-6084-4710-9BB3-C232942A451E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"285A3431-BDFE-40C5-92CD-B18217757C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D66B32CB-AC49-4A1C-85ED-6389F27CB319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"77020036-DC99-461B-9A36-E8C0BE44E6B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A2C6617-222D-4EA3-A194-4D69B10197DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF046E4-503B-4A10-BEAB-3144BD86EA49\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Apr/231\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/May/13\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/106006\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/66956\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gist.github.com/10446549\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gist.github.com/emboss/91696b56cd227c8a0c13\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/adrienthebo/cve-2014-2734/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://news.ycombinator.com/item?id=7601973\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Apr/231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/May/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/106006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/66956\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gist.github.com/10446549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gist.github.com/emboss/91696b56cd227c8a0c13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/adrienthebo/cve-2014-2734/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://news.ycombinator.com/item?id=7601973\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…