CVE-2017-11465

The parser_yyerror function in the UTF-8 parser in Ruby 2.4.1 allows attackers to cause a denial of service (invalid write or read) or possibly have unspecified other impact via a crafted Ruby script, related to the parser_tokadd_utf8 function in parse.y. NOTE: this might have security relevance as a bypass of a $SAFE protection mechanism.
References
Link Resource
https://bugs.ruby-lang.org/issues/13742 Issue Tracking Patch Vendor Advisory
https://bugs.ruby-lang.org/projects/ruby-trunk/repository/revisions/59344 Issue Tracking Patch Vendor Advisory
https://bugs.ruby-lang.org/issues/13742 Issue Tracking Patch Vendor Advisory
https://bugs.ruby-lang.org/projects/ruby-trunk/repository/revisions/59344 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ruby-lang:ruby:2.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 03:07

Type Values Removed Values Added
References () https://bugs.ruby-lang.org/issues/13742 - Issue Tracking, Patch, Vendor Advisory () https://bugs.ruby-lang.org/issues/13742 - Issue Tracking, Patch, Vendor Advisory
References () https://bugs.ruby-lang.org/projects/ruby-trunk/repository/revisions/59344 - Issue Tracking, Patch, Vendor Advisory () https://bugs.ruby-lang.org/projects/ruby-trunk/repository/revisions/59344 - Issue Tracking, Patch, Vendor Advisory

Information

Published : 2017-07-19 21:29

Updated : 2024-11-21 03:07


NVD link : CVE-2017-11465

Mitre link : CVE-2017-11465

CVE.ORG link : CVE-2017-11465


JSON object : View

Products Affected

ruby-lang

  • ruby
CWE
CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write