Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100890 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039363 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1042004 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:3485 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0378 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0583 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0585 - Third Party Advisory | |
References | () https://bugs.ruby-lang.org/issues/13853 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://hackerone.com/reports/209949 - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201710-18 - Third Party Advisory | |
References | () https://usn.ubuntu.com/3685-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2017/dsa-3966 - Third Party Advisory | |
References | () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/ - Vendor Advisory | |
References | () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ - Vendor Advisory |
Information
Published : 2017-08-31 17:29
Updated : 2024-11-21 03:12
NVD link : CVE-2017-14064
Mitre link : CVE-2017-14064
CVE.ORG link : CVE-2017-14064
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_workstation
canonical
- ubuntu_linux
ruby-lang
- ruby
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer