U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-5147

Change History

Initial Analysis by NIST 4/04/2017 11:08:15 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p353:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p481:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p576:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p594:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p598:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p643:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p645:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.0.0:p647:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.1.5:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.1.6:*:*:*:*:*:*:*
     *cpe:2.3:a:ruby-lang:ruby:2.1.7:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Added CWE

								
							
							
						
CWE-20
Changed Reference Type
http://seclists.org/oss-sec/2015/q3/222 No Types Assigned
http://seclists.org/oss-sec/2015/q3/222 Patch, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/76060 No Types Assigned
http://www.securityfocus.com/bid/76060 Third Party Advisory, VDB Entry
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1248935 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=1248935 Issue Tracking, Patch, Third Party Advisory, VDB Entry
Changed Reference Type
https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b No Types Assigned
https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b Patch, Third Party Advisory
Changed Reference Type
https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/ No Types Assigned
https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/ Vendor Advisory