{"id":"USN-3528-1","summary":"ruby1.9.1, ruby2.3 vulnerabilities","details":"It was discovered that Ruby incorrectly handled certain terminal emulator\nescape sequences. An attacker could use this to execute arbitrary code via\na crafted user name. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.\n(CVE-2017-10784)\n\nIt was discovered that Ruby incorrectly handled certain strings.\nAn attacker could use this to cause a denial of service. This issue\nonly affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2017-14033)\n\nIt was discovered that Ruby incorrectly handled some generating JSON.\nAn attacker could use this to possible expose sensitive information.\nThis issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10.\n(CVE-2017-14064)\n\nIt was discovered that Ruby incorrectly handled certain inputs.\nAn attacker could use this to execute arbitrary code.\n(CVE-2017-17790)\n","modified":"2026-02-10T04:41:16Z","published":"2018-01-10T14:22:37Z","related":["UBUNTU-CVE-2017-10784","UBUNTU-CVE-2017-14033","UBUNTU-CVE-2017-14064","UBUNTU-CVE-2017-17790"],"upstream":["CVE-2017-10784","CVE-2017-14033","CVE-2017-14064","CVE-2017-17790","UBUNTU-CVE-2017-10784","UBUNTU-CVE-2017-14033","UBUNTU-CVE-2017-14064","UBUNTU-CVE-2017-17790"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3528-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10784"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-14033"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-14064"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17790"}],"affected":[{"package":{"name":"ruby1.9.1","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/ruby1.9.1@1.9.3.484-2ubuntu1.7?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.3.484-2ubuntu1.7"}]}],"versions":["1.9.3.194-8.1ubuntu2","1.9.3.448-1ubuntu1","1.9.3.448-1ubuntu2","1.9.3.484-1ubuntu1","1.9.3.484-1ubuntu2","1.9.3.484-2ubuntu1","1.9.3.484-2ubuntu1.1","1.9.3.484-2ubuntu1.2","1.9.3.484-2ubuntu1.3","1.9.3.484-2ubuntu1.5","1.9.3.484-2ubuntu1.6"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libruby1.9.1","binary_version":"1.9.3.484-2ubuntu1.7"},{"binary_name":"libtcltk-ruby1.9.1","binary_version":"1.9.3.484-2ubuntu1.7"},{"binary_name":"ri1.9.1","binary_version":"1.9.3.484-2ubuntu1.7"},{"binary_name":"ruby1.9.1","binary_version":"1.9.3.484-2ubuntu1.7"},{"binary_name":"ruby1.9.1-dev","binary_version":"1.9.3.484-2ubuntu1.7"},{"binary_name":"ruby1.9.1-examples","binary_version":"1.9.3.484-2ubuntu1.7"},{"binary_name":"ruby1.9.1-full","binary_version":"1.9.3.484-2ubuntu1.7"},{"binary_name":"ruby1.9.3","binary_version":"1.9.3.484-2ubuntu1.7"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3528-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2017-17790","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"ruby2.3","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ruby2.3@2.3.1-2~16.04.5?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.1-2~16.04.5"}]}],"versions":["2.3.0-1","2.3.0-2","2.3.0-4ubuntu2","2.3.0-4ubuntu3","2.3.0-5ubuntu1","2.3.1-2~16.04","2.3.1-2~16.04.2","2.3.1-2~16.04.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libruby2.3","binary_version":"2.3.1-2~16.04.5"},{"binary_name":"ruby2.3","binary_version":"2.3.1-2~16.04.5"},{"binary_name":"ruby2.3-dev","binary_version":"2.3.1-2~16.04.5"},{"binary_name":"ruby2.3-tcltk","binary_version":"2.3.1-2~16.04.5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3528-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2017-10784","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-14033","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-14064","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2017-17790","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}