Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2015-7551 |
CWE-ID | CWE-20 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU32356
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-7551
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows context-dependent attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
rubygem22-psych-2.0.8-1.8.amzn1.i686
ruby22-debuginfo-2.2.4-1.8.amzn1.i686
ruby22-2.2.4-1.8.amzn1.i686
rubygem22-io-console-0.4.3-1.8.amzn1.i686
ruby22-devel-2.2.4-1.8.amzn1.i686
ruby22-libs-2.2.4-1.8.amzn1.i686
rubygem22-bigdecimal-1.2.6-1.8.amzn1.i686
ruby21-libs-2.1.8-1.19.amzn1.i686
rubygem21-io-console-0.4.3-1.19.amzn1.i686
ruby21-devel-2.1.8-1.19.amzn1.i686
ruby21-debuginfo-2.1.8-1.19.amzn1.i686
rubygem21-psych-2.0.5-1.19.amzn1.i686
rubygem21-bigdecimal-1.2.4-1.19.amzn1.i686
ruby21-2.1.8-1.19.amzn1.i686
rubygem19-io-console-0.3-32.70.amzn1.i686
ruby19-libs-1.9.3.551-32.70.amzn1.i686
rubygem19-bigdecimal-1.1.0-32.70.amzn1.i686
ruby19-devel-1.9.3.551-32.70.amzn1.i686
ruby19-1.9.3.551-32.70.amzn1.i686
ruby19-doc-1.9.3.551-32.70.amzn1.i686
rubygem19-json-1.5.5-32.70.amzn1.i686
ruby19-debuginfo-1.9.3.551-32.70.amzn1.i686
ruby20-2.0.0.648-1.29.amzn1.i686
rubygem20-io-console-0.4.2-1.29.amzn1.i686
ruby20-libs-2.0.0.648-1.29.amzn1.i686
ruby20-debuginfo-2.0.0.648-1.29.amzn1.i686
rubygem20-bigdecimal-1.2.0-1.29.amzn1.i686
ruby20-devel-2.0.0.648-1.29.amzn1.i686
rubygem20-psych-2.0.0-1.29.amzn1.i686
noarch:
ruby22-irb-2.2.4-1.8.amzn1.noarch
rubygems22-devel-2.4.5.1-1.8.amzn1.noarch
ruby22-doc-2.2.4-1.8.amzn1.noarch
rubygems22-2.4.5.1-1.8.amzn1.noarch
ruby21-doc-2.1.8-1.19.amzn1.noarch
ruby21-irb-2.1.8-1.19.amzn1.noarch
rubygems21-devel-2.2.5-1.19.amzn1.noarch
rubygems21-2.2.5-1.19.amzn1.noarch
rubygems19-1.8.23.2-32.70.amzn1.noarch
rubygems19-devel-1.8.23.2-32.70.amzn1.noarch
rubygem19-rake-0.9.2.2-32.70.amzn1.noarch
ruby19-irb-1.9.3.551-32.70.amzn1.noarch
rubygem19-minitest-2.5.1-32.70.amzn1.noarch
rubygem19-rdoc-3.9.5-32.70.amzn1.noarch
rubygems20-2.0.14.1-1.29.amzn1.noarch
ruby20-doc-2.0.0.648-1.29.amzn1.noarch
rubygems20-devel-2.0.14.1-1.29.amzn1.noarch
ruby20-irb-2.0.0.648-1.29.amzn1.noarch
src:
ruby22-2.2.4-1.8.amzn1.src
ruby21-2.1.8-1.19.amzn1.src
ruby19-1.9.3.551-32.70.amzn1.src
ruby20-2.0.0.648-1.29.amzn1.src
x86_64:
ruby22-devel-2.2.4-1.8.amzn1.x86_64
ruby22-libs-2.2.4-1.8.amzn1.x86_64
rubygem22-io-console-0.4.3-1.8.amzn1.x86_64
ruby22-debuginfo-2.2.4-1.8.amzn1.x86_64
rubygem22-psych-2.0.8-1.8.amzn1.x86_64
rubygem22-bigdecimal-1.2.6-1.8.amzn1.x86_64
ruby22-2.2.4-1.8.amzn1.x86_64
rubygem21-bigdecimal-1.2.4-1.19.amzn1.x86_64
ruby21-2.1.8-1.19.amzn1.x86_64
rubygem21-psych-2.0.5-1.19.amzn1.x86_64
ruby21-debuginfo-2.1.8-1.19.amzn1.x86_64
ruby21-devel-2.1.8-1.19.amzn1.x86_64
ruby21-libs-2.1.8-1.19.amzn1.x86_64
rubygem21-io-console-0.4.3-1.19.amzn1.x86_64
ruby19-devel-1.9.3.551-32.70.amzn1.x86_64
rubygem19-bigdecimal-1.1.0-32.70.amzn1.x86_64
ruby19-libs-1.9.3.551-32.70.amzn1.x86_64
rubygem19-io-console-0.3-32.70.amzn1.x86_64
ruby19-doc-1.9.3.551-32.70.amzn1.x86_64
ruby19-debuginfo-1.9.3.551-32.70.amzn1.x86_64
ruby19-1.9.3.551-32.70.amzn1.x86_64
rubygem19-json-1.5.5-32.70.amzn1.x86_64
ruby20-debuginfo-2.0.0.648-1.29.amzn1.x86_64
rubygem20-bigdecimal-1.2.0-1.29.amzn1.x86_64
ruby20-2.0.0.648-1.29.amzn1.x86_64
ruby20-libs-2.0.0.648-1.29.amzn1.x86_64
rubygem20-psych-2.0.0-1.29.amzn1.x86_64
ruby20-devel-2.0.0.648-1.29.amzn1.x86_64
rubygem20-io-console-0.4.2-1.29.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2016-632.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.