| CVE-ID |
CVE-2014-2734
|
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
| Description |
| ** DISPUTED ** The openssl extension in Ruby 2.x does not properly
maintain the state of process memory after a file is reopened, which
allows remote attackers to spoof signatures within the context of a
Ruby script that attempts signature verification after performing a
certain sequence of filesystem operations. NOTE: this issue has been
disputed by the Ruby OpenSSL team and third parties, who state that
the original demonstration PoC contains errors and redundant or
unnecessarily-complex code that does not appear to be related to a
demonstration of the issue. As of 20140502, CVE is not aware of any
public comment by the original researcher.
|
| References |
|
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
|
| Assigning CNA |
| N/A |
| Date Entry Created |
| 20140408 |
Disclaimer: The entry creation date may reflect when
the CVE ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
| Phase (Legacy) |
| Assigned (20140408) |
| Votes (Legacy) |
|
| Comments (Legacy) |
|
| Proposed (Legacy) |
| N/A |
|
This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. |
|
|
|
For More Information: cve@mitre.org
|