Ruby Random Number Values Information Disclosure Vulnerability

Summary
This host is installed with Ruby and is prone to information disclosure vulnerability.
Impact
Successful exploits may allow attackers to predict random number values. Impact Level: Application
Solution
Upgrade to Ruby version 1.8.6-p114 or later For updates refer to http://rubyforge.org/frs/?group_id=167
Insight
The flaw exists because ruby does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process.
Affected
Ruby Versions prior to Ruby 1.8.6-p114
References