CVE-2021-41816

CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:ruby:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:ruby:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://hackerone.com/reports/1328463 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1328463 - Permissions Required, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/ -
References () https://security-tracker.debian.org/tracker/CVE-2021-41816 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2021-41816 - Third Party Advisory
References () https://security.gentoo.org/glsa/202401-27 - () https://security.gentoo.org/glsa/202401-27 -
References () https://security.netapp.com/advisory/ntap-20220303-0006/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220303-0006/ - Third Party Advisory
References () https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/ - Exploit, Vendor Advisory () https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/ - Exploit, Vendor Advisory

24 Jan 2024, 05:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-27 -

07 Nov 2023, 03:39

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/', 'name': 'FEDORA-2022-82a9edac27', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/', 'name': 'FEDORA-2022-8cf0124add', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/ -

Information

Published : 2022-02-06 21:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41816

Mitre link : CVE-2021-41816

CVE.ORG link : CVE-2021-41816


JSON object : View

Products Affected

ruby-lang

  • cgi
  • ruby

fedoraproject

  • fedora
CWE
CWE-190

Integer Overflow or Wraparound