View | Details | Raw Unified | Return to bug 201061
Collapse All | Expand All

(-)vuln.xml (+30 lines)
Lines 57-62 Link Here
57
57
58
-->
58
-->
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
  <vuln vid="f5225b23-192d-11e5-a1cf-002590263bf5">
61
    <topic>rubygem-bson -- DoS and possible injection</topic>
62
    <affects>
63
      <package>
64
	<name>rubygem-bson</name>
65
	<range><lt>3.0.4</lt></range>
66
      </package>
67
    </affects>
68
    <description>
69
      <body xmlns="http://www.w3.org/1999/xhtml">
70
	<p>Phill MV reports:</p>
71
	<blockquote cite="http://www.openwall.com/lists/oss-security/2015/06/06/1">
72
	  <p>By submitting a specially crafted string to a service relying on
73
	    the bson rubygem, an attacker may trigger denials of service or even
74
	    inject data into victim's MongoDB instances.</p>
75
	</blockquote>
76
      </body>
77
    </description>
78
    <references>
79
      <cvename>CVE-2015-4412</cvename>
80
      <mlist>http://www.openwall.com/lists/oss-security/2015/06/06/1</mlist>
81
      <url>http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html</url>
82
      <url>https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7</url>
83
    </references>
84
    <dates>
85
      <discovery>2015-06-04</discovery>
86
      <entry>2015-06-22</entry>
87
    </dates>
88
  </vuln>
89
60
  <vuln vid="a4460ac7-192c-11e5-9c01-bcaec55be5e5">
90
  <vuln vid="a4460ac7-192c-11e5-9c01-bcaec55be5e5">
61
    <topic>devel/ipython -- remote execution</topic>
91
    <topic>devel/ipython -- remote execution</topic>
62
    <affects>
92
    <affects>

Return to bug 201061