CVE-2006-1931

N/A Unknown
Published: April 20, 2006 Modified: April 16, 2026
View on NVD

Description

The HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/16904
Source: secalert@redhat.com
http://secunia.com/advisories/19772
Source: secalert@redhat.com
http://secunia.com/advisories/19804
Source: secalert@redhat.com
http://secunia.com/advisories/20024
Source: secalert@redhat.com
http://secunia.com/advisories/20064
Source: secalert@redhat.com
http://secunia.com/advisories/20457
Source: secalert@redhat.com
http://secunia.com/advisories/21657
Source: secalert@redhat.com
http://securitytracker.com/id?1015978
Source: secalert@redhat.com
http://www.osvdb.org/24972
Source: secalert@redhat.com
http://www.securityfocus.com/bid/17645
Source: secalert@redhat.com
https://usn.ubuntu.com/273-1/
Source: secalert@redhat.com
ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-webrick-dos-1.patch
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-dev/27787
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://secunia.com/advisories/16904
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19772
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19804
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20024
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20064
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20457
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21657
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015978
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1157
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200605-11.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:079
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006-06-02.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/24972
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0427.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17645
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189540
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26102
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/273-1/
Source: af854a3a-2127-422b-91ae-364da2661108

44 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
13.2%
94th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

yukihiro_matsumoto