CVE-2016-2339

An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:48

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/91234 - () http://www.securityfocus.com/bid/91234 -
References () http://www.talosintelligence.com/reports/TALOS-2016-0034/ - Exploit, Technical Description, Third Party Advisory, VDB Entry () http://www.talosintelligence.com/reports/TALOS-2016-0034/ - Exploit, Technical Description, Third Party Advisory, VDB Entry
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html -

Information

Published : 2017-01-06 21:59

Updated : 2024-11-21 02:48


NVD link : CVE-2016-2339

Mitre link : CVE-2016-2339

CVE.ORG link : CVE-2016-2339


JSON object : View

Products Affected

ruby-lang

  • ruby
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer