CVE-2014-2734 (GCVE-0-2014-2734)
Vulnerability from cvelistv5
Published
2014-04-24 23:00
Modified
2024-08-06 10:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:21:36.074Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html" }, { "name": "106006", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/106006" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://news.ycombinator.com/item?id=7601973" }, { "name": "66956", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66956" }, { "name": "20140502 Re: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/May/13" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/10446549" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/emboss/91696b56cd227c8a0c13" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/adrienthebo/cve-2014-2734/" }, { "name": "20140416 Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Apr/231" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-15T19:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html" }, { "name": "106006", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/106006" }, { "tags": [ "x_refsource_MISC" ], "url": "https://news.ycombinator.com/item?id=7601973" }, { "name": "66956", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66956" }, { "name": "20140502 Re: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/May/13" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/10446549" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/emboss/91696b56cd227c8a0c13" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/adrienthebo/cve-2014-2734/" }, { "name": "20140416 Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Apr/231" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2734", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html" }, { "name": "106006", "refsource": "OSVDB", "url": "http://www.osvdb.org/106006" }, { "name": "https://news.ycombinator.com/item?id=7601973", "refsource": "MISC", "url": "https://news.ycombinator.com/item?id=7601973" }, { "name": "66956", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66956" }, { "name": "20140502 Re: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/May/13" }, { "name": "https://gist.github.com/10446549", "refsource": "MISC", "url": "https://gist.github.com/10446549" }, { "name": "https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/", "refsource": "MISC", "url": "https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/" }, { "name": "https://gist.github.com/emboss/91696b56cd227c8a0c13", "refsource": "MISC", "url": "https://gist.github.com/emboss/91696b56cd227c8a0c13" }, { "name": "https://github.com/adrienthebo/cve-2014-2734/", "refsource": "MISC", "url": "https://github.com/adrienthebo/cve-2014-2734/" }, { "name": "20140416 Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Apr/231" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2734", "datePublished": "2014-04-24T23:00:00", "dateReserved": "2014-04-08T00:00:00", "dateUpdated": "2024-08-06T10:21:36.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-2734\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-04-24T23:55:05.707\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[{\"sourceIdentifier\":\"cve@mitre.org\",\"tags\":[\"disputed\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher\"},{\"lang\":\"es\",\"value\":\"** DISPUTADA ** La extensi\u00f3n openssl en Ruby 2.x no mantiene correctamente el estado de la memoria de procesos despu\u00e9s de la reapertura de un fichero, lo que permite a atacantes remotos falsificar firmas dentro del contexto de una secuencia de comandos Ruby que intenta la verificaci\u00f3n de firmas despu\u00e9s de realizar cierta secuencia de operaciones del sistema de ficheros. NOTA: este problema ha sido disputado por el equipo OpenSSL de Ruby y terceras partes, que dicen que la demostraci\u00f3n PoC original contiene errores y c\u00f3digo redundante o innecesariamente complejo que no parece estar relacionado con una demostraci\u00f3n del problema. Desde 02052014, CVE no est\u00e1 consciente de ning\u00fan comentario p\u00fablico por parte del investigador original.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90E0471D-1323-4E67-B66C-DEBF3BBAEEAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03B7561-A854-4EFA-9E4E-CFC4EEAE4EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2423B85-0971-42AC-8B64-819008BC5778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C663278-3B2A-4B7C-959A-2AA804467F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7927149-A76A-48BC-8405-7375FC7D7486\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB116A84-1652-4F5D-98AC-81F0349EEDC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*\",\"matchCriteriaId\":\"259C21E7-6084-4710-9BB3-C232942A451E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"285A3431-BDFE-40C5-92CD-B18217757C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D66B32CB-AC49-4A1C-85ED-6389F27CB319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"77020036-DC99-461B-9A36-E8C0BE44E6B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A2C6617-222D-4EA3-A194-4D69B10197DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF046E4-503B-4A10-BEAB-3144BD86EA49\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Apr/231\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/May/13\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/106006\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/66956\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gist.github.com/10446549\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gist.github.com/emboss/91696b56cd227c8a0c13\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/adrienthebo/cve-2014-2734/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://news.ycombinator.com/item?id=7601973\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Apr/231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/May/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/106006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/66956\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gist.github.com/10446549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gist.github.com/emboss/91696b56cd227c8a0c13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/adrienthebo/cve-2014-2734/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://news.ycombinator.com/item?id=7601973\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…