14 lines
No EOL
657 B
Text
14 lines
No EOL
657 B
Text
source: https://www.securityfocus.com/bid/17645/info
|
|
|
|
Ruby is affected by a denial-of-service vulnerability in the WEBrick HTTP server. This issue is due to the use of blocking network operations. Ruby's implementation of XML/RPC is also affected, since it uses the vulnerable WEBrick server.
|
|
|
|
This issue allows remote attackers to cause affected webservers to fail to respond to further legitimate requests.
|
|
|
|
Ruby versions prior to 1.8.3 are affected by this issue.
|
|
|
|
The following Ruby command will issue a request sufficient to trigger this issue:
|
|
|
|
ruby -rsocket -e 'TCPSocket.open("www.example.com", 10080) {|s|
|
|
s.print "GET /z HTTP/1.0\r\n\r\n"
|
|
sleep
|
|
}' |