An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/91234 | |
http://www.talosintelligence.com/reports/TALOS-2016-0034/ | Exploit Technical Description Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html | |
http://www.securityfocus.com/bid/91234 | |
http://www.talosintelligence.com/reports/TALOS-2016-0034/ | Exploit Technical Description Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/91234 - | |
References | () http://www.talosintelligence.com/reports/TALOS-2016-0034/ - Exploit, Technical Description, Third Party Advisory, VDB Entry | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - |
Information
Published : 2017-01-06 21:59
Updated : 2024-11-21 02:48
NVD link : CVE-2016-2339
Mitre link : CVE-2016-2339
CVE.ORG link : CVE-2016-2339
JSON object : View
Products Affected
ruby-lang
- ruby
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer