CVE-2017-14064

Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
References
Link Resource
http://www.securityfocus.com/bid/100890 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039363 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:3485 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0378 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0583 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0585 Third Party Advisory
https://bugs.ruby-lang.org/issues/13853 Issue Tracking Patch Vendor Advisory
https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85 Issue Tracking Patch Third Party Advisory
https://hackerone.com/reports/209949 Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201710-18 Third Party Advisory
https://usn.ubuntu.com/3685-1/ Third Party Advisory
https://www.debian.org/security/2017/dsa-3966 Third Party Advisory
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/ Vendor Advisory
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ Vendor Advisory
http://www.securityfocus.com/bid/100890 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039363 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:3485 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0378 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0583 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0585 Third Party Advisory
https://bugs.ruby-lang.org/issues/13853 Issue Tracking Patch Vendor Advisory
https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85 Issue Tracking Patch Third Party Advisory
https://hackerone.com/reports/209949 Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201710-18 Third Party Advisory
https://usn.ubuntu.com/3685-1/ Third Party Advisory
https://www.debian.org/security/2017/dsa-3966 Third Party Advisory
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/ Vendor Advisory
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.0:preview1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.0:preview2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:preview1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:preview2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:preview3:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:12

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100890 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100890 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039363 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039363 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1042004 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1042004 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:3485 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:3485 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0378 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0378 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0583 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0583 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0585 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0585 - Third Party Advisory
References () https://bugs.ruby-lang.org/issues/13853 - Issue Tracking, Patch, Vendor Advisory () https://bugs.ruby-lang.org/issues/13853 - Issue Tracking, Patch, Vendor Advisory
References () https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85 - Issue Tracking, Patch, Third Party Advisory () https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85 - Issue Tracking, Patch, Third Party Advisory
References () https://hackerone.com/reports/209949 - Exploit, Third Party Advisory () https://hackerone.com/reports/209949 - Exploit, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201710-18 - Third Party Advisory () https://security.gentoo.org/glsa/201710-18 - Third Party Advisory
References () https://usn.ubuntu.com/3685-1/ - Third Party Advisory () https://usn.ubuntu.com/3685-1/ - Third Party Advisory
References () https://www.debian.org/security/2017/dsa-3966 - Third Party Advisory () https://www.debian.org/security/2017/dsa-3966 - Third Party Advisory
References () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/ - Vendor Advisory () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/ - Vendor Advisory
References () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ - Vendor Advisory () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ - Vendor Advisory

Information

Published : 2017-08-31 17:29

Updated : 2024-11-21 03:12


NVD link : CVE-2017-14064

Mitre link : CVE-2017-14064

CVE.ORG link : CVE-2017-14064


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_server_tus
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

ruby-lang

  • ruby

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer