CVE-2018-10199

In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:41

Type Values Removed Values Added
References () https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 - Patch () https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 - Patch
References () https://github.com/mruby/mruby/issues/4001 - Third Party Advisory () https://github.com/mruby/mruby/issues/4001 - Third Party Advisory

Information

Published : 2018-04-18 15:29

Updated : 2024-11-21 03:41


NVD link : CVE-2018-10199

Mitre link : CVE-2018-10199

CVE.ORG link : CVE-2018-10199


JSON object : View

Products Affected

mruby

  • mruby
CWE
CWE-416

Use After Free