Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100862 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039363 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:3485 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0378 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0583 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0585 - | |
References | () https://github.com/mruby/mruby/issues/3722 - Exploit, Third Party Advisory | |
References | () https://hackerone.com/reports/212241 - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - | |
References | () https://security.gentoo.org/glsa/201710-18 - | |
References | () https://usn.ubuntu.com/3685-1/ - | |
References | () https://www.debian.org/security/2017/dsa-4031 - | |
References | () https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/ - Vendor Advisory |
Information
Published : 2017-09-15 19:29
Updated : 2024-11-21 03:03
NVD link : CVE-2017-0898
Mitre link : CVE-2017-0898
CVE.ORG link : CVE-2017-0898
JSON object : View
Products Affected
ruby-lang
- ruby
CWE
CWE-134
Use of Externally-Controlled Format String