In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
References
Link | Resource |
---|---|
https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 | Patch |
https://github.com/mruby/mruby/issues/4001 | Third Party Advisory |
https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 | Patch |
https://github.com/mruby/mruby/issues/4001 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 - Patch | |
References | () https://github.com/mruby/mruby/issues/4001 - Third Party Advisory |
Information
Published : 2018-04-18 15:29
Updated : 2024-11-21 03:41
NVD link : CVE-2018-10199
Mitre link : CVE-2018-10199
CVE.ORG link : CVE-2018-10199
JSON object : View
Products Affected
mruby
- mruby
CWE
CWE-416
Use After Free