Impact: this regression breaks (at least) the metasploit framework. It
appears that short-named constants are not generally in wide-spread use
(based on community feedback and lack of other bug reports)

Development release: applied the exact patch to 9.04 in
1.8.7.72-1ubuntu1. This is from http://svn.ruby-lang.org/cgi-
bin/viewvc.cgi?view=rev&revision=18485, and is already in upstream's
stable snapshot. Debdiff for the upload is attached.

TEST CASE (from HD Moore):
The example below assumes you have a Windows server somewhere with port 135 
open:

$ svn co http://metasploit.com/svn/framework3/trunk/ msf3
$ ruby msf3/msfcli exploit/windows/dcerpc/ms03_026_dcom 
PAYLOAD=windows/shell/bind_tcp RHOST=10.10.10.250 E
(change 10.10.10.250 to a machine with DCOM open, patch level does not matter)

[*] Started bind handler
[*] Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
[*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:[EMAIL 
PROTECTED]:10.10.10.250[135] ...
[*] Bound to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:[EMAIL 
PROTECTED]:10.10.10.250[135] ...
[-] Exploit failed: uninitialized constant Msf::ModuleSet::NDR

A working/patched version of Ruby will not trigger that "uninitialized
constant" error.


Regression potential: appears low due to the perceived infrequency of using 
short-named constants


** Attachment added: "ruby1.8_1.8.7.72-1ubuntu0.1.debdiff"
   http://launchpadlibrarian.net/19817662/ruby1.8_1.8.7.72-1ubuntu0.1.debdiff

** Changed in: ruby1.8 (Ubuntu Intrepid)
       Status: Confirmed => In Progress

-- 
Ruby 1.8 package breaks the Metasploit Framework (short-named constants)
https://bugs.launchpad.net/bugs/282302
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to