Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security The Internet

Multiple Security Holes In Ruby 1.8, 1.9 148

ruphus13 notes a six-pack of serious vulnerabilities discovered in Ruby by a member of Apple's security team, Drew Yao. Patches are linked from the ruby-lang.org advisory. "With the following vulnerabilities, an attacker can lead to denial of service condition or execute arbitrary code... These vulnerabilities are likely to crop up in just about any average ruby web application. And by 'crop up' I mean 'crop up exploitable from trivial user-specified parameters.' It's not hard to begin imagining cases where Ruby/Rails programmers use code similar to the samples above to routinely handle user input."
This discussion has been archived. No new comments can be posted.

Multiple Security Holes In Ruby 1.8, 1.9

Comments Filter:
  • Re:The real story (Score:4, Insightful)

    by JeremyGNJ ( 1102465 ) on Monday June 23, 2008 @08:39AM (#23901949)
    That's really not the story. The story is how simple the exploits were and yet, how long it took to be discovered.

  • Re:Confirmation (Score:4, Insightful)

    by setagllib ( 753300 ) on Monday June 23, 2008 @08:40AM (#23901965)

    Then what is? Sun Java and Microsoft .NET have both had long histories of security patches. Python is a lot better but nothing is perfect.

    At least with a Linux Python/Ruby you get the security fix within hours as part of your regular operating system update. With Java you have to download the whole thing again from Sun's site. With .NET you have to wait for patch tuesday or apply a hotfix manually.

  • Re:The real story (Score:5, Insightful)

    by mccalli ( 323026 ) on Monday June 23, 2008 @08:41AM (#23901967) Homepage
    The real story here is how quickly the bugs were patched. I'd like to see MS respond half as fast to holes in Windows and it's attendant parts and pieces.

    No. The real story here are the security bugs, precisely as described. This isn't cheerleading - to users of Ruby it really doesn't matter how fast some other imagined patch might have come out from another company for a different product. If I'm running Ruby, I need to know that these bugs exist and that patches can be applied for them.

    Drop the us vs them thinking - it doesn't help is pretty much just FUD.

    Cheers,
    Ian
  • by LunarCrisis ( 966179 ) on Monday June 23, 2008 @08:54AM (#23902049)
    The bugs would have been there even if Apple hadn't found them. Why not thank them for improving the quality of Ruby?
  • Re:The real story (Score:5, Insightful)

    by CrazedWalrus ( 901897 ) on Monday June 23, 2008 @09:05AM (#23902191) Journal

    How did open source fail? Someone who wasn't the original author had access to the code and found the bugs. How quickly it's found is a function of how many qualified people are looking at the code. I didn't RTFA, but presumably Drew Yao, a member of the security team, was security auditing the code. This activity would have been much harder to impossible with closed source code.

    I'd say the system worked as advertised here.

  • Goes to show ... (Score:2, Insightful)

    by Qbertino ( 265505 ) <moiraNO@SPAMmodparlor.com> on Monday June 23, 2008 @09:08AM (#23902207)

    This, IMHO, goes to show that Ruby isn't any better than the other Open Source interpreted languages. Despite what the Ruby fanboys allways claim, it is actually far less mature then, let's say, Python or PHP.
    A matured, tested and established mod_ruby, unicode and a few years more in the field is what Ruby needs before I take a look at it.

    My 2 cents.

  • Re:The real story (Score:5, Insightful)

    by headLITE ( 171240 ) on Monday June 23, 2008 @09:14AM (#23902259)

    A vulnerability in an open source project was found by a third party doing a security audit of the code. The possibility to validate the source code is exactly what open source proponents claim is the reason for open source being more secure. Everybody can have a go, a thousand pairs of eyes see more than one pair, and all that. Try auditing Visual Basic 6 for comparison.

  • Re:Confirmation (Score:3, Insightful)

    by headLITE ( 171240 ) on Monday June 23, 2008 @09:19AM (#23902329)

    Agreed. It also usually doesn't refer to a programming language or environment. At any rate, "enterprise" applications have historically been written in a bunch of languages that don't do array bounds checking. Granted, ruby is supposed to do it, but I mean, seriously - are kids these days so spoiled by JavaScript and VB that this kind of error is a surprise and the biggest bug ever?

  • Re:The real story (Score:3, Insightful)

    by Richard_at_work ( 517087 ) on Monday June 23, 2008 @09:24AM (#23902401)

    This activity would have been much harder to impossible with closed source code.

    I'd say the system worked as advertised here.

    Yup, because Microsoft certainly never have exploits such as these discovered...
  • Re:The real story (Score:5, Insightful)

    by Anonymous Coward on Monday June 23, 2008 @09:33AM (#23902505)

    How did open source fail? Someone who wasn't the original author had access to the code and found the bugs. How quickly it's found is a function of how many qualified people are looking at the code. I'd say the system worked as advertised here.
    Slight correction -- it's a function of how many qualified and honest people are looking at the code. Now, the skilled but dishonest Russian hacking cartels had a financial incentive to look through the code for security problems; comparatively few security researchers had financial incentives to do so. Are you really sure this is the first time this bug has been discovered? Or just the first time by nice cooperative people who don't exploit it and keep it secret?
  • Re:Confirmation (Score:2, Insightful)

    by Anonymous Coward on Monday June 23, 2008 @09:45AM (#23902647)

    Actually, considering its age, Java DOESN'T have a "long" history of security patches. Java was designed by security freaks and the security both of the core language and the standard platforms is extensively vetted and tested by security professionals. Which is why you have to look long and hard for news reports of major security breaches in Java.

    The Java system is considered to be an integrated whole and new releases have to pass an extensive suite of tests before they are certified. Yes, it's a royal pain in the [censored] to have to download an entire enormous new release of the runtime engine and support classes, but the upside is that you don't get the kinds of security and reliability issues that come from a mix-match-and-patch approach. There's only a small number of possible configurations to keep clean.

  • by Anonymous Coward on Monday June 23, 2008 @09:47AM (#23902687)

    Case 1: the code has no bugs: "many eyes make for shallow bugs!" everyone chants.

    Case 2: the code has bugs which get reported and fixed. "See, this would have taken much longer if the source was closed!" This claim is impossible to verify objectively but is stated as a fact, regardless of how trivial the bugs are.

  • by UnknowingFool ( 672806 ) on Monday June 23, 2008 @09:50AM (#23902759)

    Apple finds serious bugs in Ruby. They tell the Ruby developers. Ruby developers issue patches. That's not sensational.

    MS finds a bug in Safari. They tell everyone not to use Safari. I see slight differences. :P

  • by Fweeky ( 41046 ) on Monday June 23, 2008 @09:54AM (#23902813) Homepage

    PHP had extremely similar holes fairly recently; integer overflows, string length fuckups, etc. In code that was far more obviously hilariously bad; e.g. using float to track string length, and checking an int for > MAX_INT to detect overflow. The initial fixes were similarly hilarious too.

    In the mean time, until a couple of days ago half my Ruby services have been up for on the order of 14 months, and will likely do the same for the next 14, though by then there will probably be three or four different VM's to deploy it on instead of just two. Also, our PHP's will probably continue to go into weird unbusy loops, and occasionally crash for no apparant reason.

    So, um, how's jPHP and Jython coming along? Would you deploy a real life application on Jython?

  • Re:The real story (Score:4, Insightful)

    by CrazedWalrus ( 901897 ) on Monday June 23, 2008 @09:56AM (#23902835) Journal

    I didn't say anything about Microsoft. Obviously there are, but the source is much more difficult to obtain. If the source can't be obtained, auditors must use more difficult types of testing, or just hope that the vendor did their job correctly.

    My only point was that Apple would have a much more difficult time auditing, say, Office for Mac, than they would with Ruby due to the requirement for source code agreements or using more arcane methods like blackbox testing or disassembly. The same applies to Photoshop, Flash, or any other 3rd party closed-source app.

    The victory here is that Ruby was improved by a 3rd party who had ready access to the source. When the source is available, this will happen much more often than when it's not.

  • by Etherized ( 1038092 ) on Monday June 23, 2008 @10:19AM (#23903095)

    Keep in mind that ruby and PHP are essentially contemporaries - they've both been in real use for over a decade. By most measures, one would think of them as being "mature" technologies, and yet we still see bugs like this crop up in both languages. I think it just goes to show - while selecting a "mature" technology has its advantages, it will not make you immune to problems.

    For what it's worth, this appears to be a flaw in the official ruby interpreter. That's a big deal, of course, but just so you know: most people who speak the praises of ruby are talking about the structure of the language, not necessarily the implementation of the interpreter itself. There are alternate implementations of the ruby interpreter that are generally considered to be "better" than Matz's in many ways.

  • FUD? (Score:3, Insightful)

    by MarkusQ ( 450076 ) on Monday June 23, 2008 @10:19AM (#23903105) Journal

    These vulnerabilities are likely to crop up in just about any average ruby web application. And by 'crop up' I mean 'crop up exploitable from trivial user-specified parameters.'

    Huh? Who lets users enter arbitrary integers to index into arrays? Or let's users submit arbitrary loops for execution? Apart from the statement quoted above, what indication is there that any of these would "crop up" in any but the most contrived circumstances?

    --MarkusQ

  • Re:Confirmation (Score:4, Insightful)

    by Idaho ( 12907 ) on Monday June 23, 2008 @10:59AM (#23903583)

    Granted, ruby is supposed to do it, but I mean, seriously - are kids these days so spoiled by JavaScript and VB that this kind of error is a surprise and the biggest bug ever?

    1. If the interpreter is supposed to do it, except it then turns out it actually doesn't (or doesn't do it correctly), then yes.
    2. If the problem occurs in something that is a part of the language itself, or at least part of its standard library/built-in types, or, however you want to define it, if it is in the set of stuff that everyone who has the language installed has installed, and the functionality is used in pretty much any program ever written in the language, then yes.

    So, yes.

  • by MarkWatson ( 189759 ) on Monday June 23, 2008 @10:59AM (#23903599) Homepage

    I did some testing on an off line server, and then pushed these patches.

    I am concerned about "Ruby the Platform". I have dealt with deployment and scaling issues for a few years on a customer project written in Rails + Common Lisp, and as much as I *love* coding in Ruby and Lisp, this experience has also made me appreciate "Java the platform" :-)

  • by Anonymous Coward on Monday June 23, 2008 @11:11AM (#23903747)

    And then there are those of us who just don't give a damn about what other people think, but continue to use open source on both our servers and our desktops not because of what other people claim, but because in our experience it works better.

  • by Anonymous Coward on Monday June 23, 2008 @11:17AM (#23903811)

    Case 1 is a myth. All software has bugs. Even the best and most thoroughly reviewed code typically at least 1 bug per thousand lines of code. Always. (However, they're not always security related like this.)

  • by smallpaul ( 65919 ) <paul@@@prescod...net> on Monday June 23, 2008 @11:43AM (#23904235)

    So, um, how's jPHP and Jython coming along? Would you deploy a real life application on Jython?

    So, um, how's jPHP and Jython coming along? Would you deploy a real life application on Jython?

    Go team. Rah! Rah! Rah! YEAH!!!!

    But I have two questions:

    1. What does the relative merit of Jython versus Jruby have to do with the price of tea in China? Are you moving your apps from the buggy MRI to JRuby this week to avoid these security holes?

    2. What evidence do you have that Jruby is more appropriate for "real life applications" than Jython? I know people who have deployed real life applications on Jython since before the first checkin of JRuby. For example, Websphere ships with Jython.

    http://wiki.python.org/jython/JythonUsers [python.org]

    Ruby has some real advantages over Python. But if you don't know them, don't just make stuff up.

  • by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Monday June 23, 2008 @12:42PM (#23905149) Journal

    This, IMHO, goes to show that Ruby isn't any better at security than the other Open Source interpreted languages.
    Fixed that for you.

    And it never claimed to be. I don't know anyone who uses Ruby because it's more secure. Everyone I know who uses Ruby does so because of the beautiful syntax, pervasive OO, and other things that make it nicer to program in.

    far less mature then, let's say, Python or PHP.
    Oh, [net-security.org] really? [softpedia.com]

    And again, it's not the security. I'm willing to risk having to patch my interpreter like this once in awhile, if it means I'm able to

    Keep in mind, this vulnerability is so far only a DoS, and won't necessarily affect most installations. Most people run multiple interpreters serving a single site, each load-balanced to. Knock out one and it'll be restarted, while the other continues to serve content.

    Which brings us to your next point...

    A matured, tested and established mod_ruby, unicode and a few years more in the field is what Ruby needs before I take a look at it.
    Well, let's see -- Unicode has existed, albeit not great, for quite awhile. 1.9 has had Unicode strings from the beginning.

    mod_ruby -- you do realize pretty much no one in the Ruby world uses Apache, right? It's all mongrels and nginx... But if you must, there's Passenger. [modrails.com]

    a few years more in the field is what Ruby needs before I take a look at it.
    Obviously, you really haven't taken a look at it.
  • by Achromatic1978 ( 916097 ) <robert@@@chromablue...net> on Monday June 23, 2008 @12:50PM (#23905257)

    is much better supported - including several on Google staff.

    The fuck has that to do with anything? "Hey look, people who WORK AT GOOGLE are involved in it, it must be good!"

  • Re:Derailed (Score:3, Insightful)

    by Lars T. ( 470328 ) <{Lars.Traeger} {at} {googlemail.com}> on Monday June 23, 2008 @01:48PM (#23906135) Journal

    Was there not a recent demonstration on a 'blended threat' based on the safari bug that would execute code next time IE ran, also I beleive there is another similar method for firefox 2/3.

    No, there still is a bug in IE that will run any properly named DLL on the Desktop, whether it is downloaded with the "Carpet Bomb", or by hand with any browser, download tool (incl. FTP or P2P), or moved there, or put there by fairies. And there is also a bug in Firefox that allows somebody to "steal files", which has probably to do with a certain kind of file being in its Download Folder (by default the Desktop) - again, no matter how it got there. These are bugs that need to be fixed.
  • What a joke.

    Look at almost every security advisory issued out there. "Remedy: Do not/restrict usage of X until bug is resolved".

    Making this a stab at MSFT just shows you up as an Apple fanboy.

    Ignoring that there is a much bigger hole in IE that the Apple bug makes a tiny bit easier to trigger shows you up as what then?

"Ninety percent of baseball is half mental." -- Yogi Berra

Working...