Unrated severityNVD Advisory· Published Aug 13, 2008· Updated Apr 23, 2026
CVE-2008-3655
CVE-2008-3655
Description
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Affected products
47cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*+ 46 more
- cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*range: <=1.8.5
- cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
32- www.debian.org/security/2008/dsa-1651nvdPatch
- www.vupen.com/english/advisories/2009/1297nvdPatchVendor Advisory
- www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/nvdExploit
- www.securityfocus.com/bid/30644nvdExploitPatch
- secunia.com/advisories/31430nvdVendor Advisory
- secunia.com/advisories/31697nvdVendor Advisory
- secunia.com/advisories/32165nvdVendor Advisory
- secunia.com/advisories/32219nvdVendor Advisory
- secunia.com/advisories/32255nvdVendor Advisory
- secunia.com/advisories/32256nvdVendor Advisory
- secunia.com/advisories/32371nvdVendor Advisory
- secunia.com/advisories/32372nvdVendor Advisory
- secunia.com/advisories/33178nvdVendor Advisory
- secunia.com/advisories/35074nvdVendor Advisory
- www.vupen.com/english/advisories/2008/2334nvdVendor Advisory
- www.us-cert.gov/cas/techalerts/TA09-133A.htmlnvdUS Government Resource
- bugs.debian.org/cgi-bin/bugreport.cginvd
- lists.apple.com/archives/security-announce/2009/May/msg00002.htmlnvd
- security.gentoo.org/glsa/glsa-200812-17.xmlnvd
- support.apple.com/kb/HT3549nvd
- support.avaya.com/elmodocs2/security/ASA-2008-424.htmnvd
- wiki.rpath.com/wiki/Advisories:rPSA-2008-0264nvd
- www.debian.org/security/2008/dsa-1652nvd
- www.redhat.com/support/errata/RHSA-2008-0895.htmlnvd
- www.redhat.com/support/errata/RHSA-2008-0897.htmlnvd
- www.securityfocus.com/archive/1/495884/100/0/threadednvd
- www.securitytracker.com/idnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/44369nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602nvd
- usn.ubuntu.com/651-1/nvd
- www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.htmlnvd
News mentions
0No linked articles in our index yet.