The parser_yyerror function in the UTF-8 parser in Ruby 2.4.1 allows attackers to cause a denial of service (invalid write or read) or possibly have unspecified other impact via a crafted Ruby script, related to the parser_tokadd_utf8 function in parse.y. NOTE: this might have security relevance as a bypass of a $SAFE protection mechanism.
References
Link | Resource |
---|---|
https://bugs.ruby-lang.org/issues/13742 | Issue Tracking Patch Vendor Advisory |
https://bugs.ruby-lang.org/projects/ruby-trunk/repository/revisions/59344 | Issue Tracking Patch Vendor Advisory |
https://bugs.ruby-lang.org/issues/13742 | Issue Tracking Patch Vendor Advisory |
https://bugs.ruby-lang.org/projects/ruby-trunk/repository/revisions/59344 | Issue Tracking Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.ruby-lang.org/issues/13742 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://bugs.ruby-lang.org/projects/ruby-trunk/repository/revisions/59344 - Issue Tracking, Patch, Vendor Advisory |
Information
Published : 2017-07-19 21:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11465
Mitre link : CVE-2017-11465
CVE.ORG link : CVE-2017-11465
JSON object : View
Products Affected
ruby-lang
- ruby