CVE-2015-4020 ruby1.9.1

Metadata

medium
4.3
ruby1.9.1
CVE-2015-4020
2017-06-16 19:15
ALAS-2015-547
ALAS-2015-549
ALAS-2015-548
CVE-2015-4020 jruby
CVE-2015-4020 rubygems
CVE-2015-4020 ruby2.1
CVE-2015-4020 ruby1.8
CVE-2015-4020
2017-04-01 19:11
2017-01-05 20:16

Description

RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

None

Unaffected

Release Package Reason
wheezy ruby1.9.1