Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/ http://www.vuxml.org/freebsd/959d384d-6b59-11dd-9d79-001fc61c2a55.html
Insight
The following packages are affected:
ruby
ruby+pthreads
ruby+pthreads+oniguruma
ruby+oniguruma
CVE-2008-1447
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1
(2) Microsoft DNS in Windows 2000 SP4, XP SP2
and SP3, and Server 2003 SP1 and SP2
and other implementations allow
remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka 'DNS Insufficient Socket Entropy Vulnerability' or 'the Kaminsky bug.'
Severity
Classification
-
CVE CVE-2008-1447 -
CVSS Base Score: 6.4
AV:N/AC:L/Au:N/C:N/I:P/A:P
Related Vulnerabilities