Vulnerability Details : CVE-2014-2734
The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher
Products affected by CVE-2014-2734
- cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.1:-:*:*:*:*:*:*
Threat overview for CVE-2014-2734
Top countries where our scanners detected CVE-2014-2734
Top open port discovered on systems with this issue
22
IPs affected by CVE-2014-2734 1,287
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-2734!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-2734
2.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-2734
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2014-2734
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-2734
-
https://news.ycombinator.com/item?id=7601973
Ruby OpenSSL private key spoofing? | Hacker News
-
http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html
No Results Found ≈ Packet StormExploit
-
http://seclists.org/fulldisclosure/2014/Apr/231
Full Disclosure: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoCExploit
-
http://www.securityfocus.com/bid/66956
Ruby OpenSSL CVE-2014-2734 CA Private Key Spoofing Vulnerability
-
http://seclists.org/fulldisclosure/2014/May/13
Full Disclosure: Re: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC
-
https://github.com/adrienthebo/cve-2014-2734/
GitHub - adrienthebo/cve-2014-2734: I think this CVE is full of lies and deceit and very confusing code.
-
http://www.osvdb.org/106006
404 Not Found
-
https://gist.github.com/10446549
castealer.rb · GitHub
-
https://gist.github.com/emboss/91696b56cd227c8a0c13
castealer.rb analysis · GitHub
-
https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/
Dispute of Vulnerability CVE-2014-2734
Jump to