Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
CPE | Name | Operator | Version |
---|---|---|---|
ruby | eq | 2.3.1-r1 | |
ruby | eq | 2.0.0_p195-r0 | |
ruby | eq | 2.4.1-r3 | |
ruby | eq | 2.0.0_p481-r2 | |
ruby | eq | 1.8.7_p352-r1 | |
ruby | eq | 1.9.3_p194-r0 | |
ruby | eq | 1.8.7_p174-r0 | |
ruby | eq | 1.9.3_p362-r0 | |
ruby | eq | 2.0.0_p481-r0 | |
ruby | eq | 1.9.3_p374-r2 |
www.securityfocus.com/bid/100862
www.securitytracker.com/id/1039363
access.redhat.com/errata/RHSA-2017:3485
access.redhat.com/errata/RHSA-2018:0378
access.redhat.com/errata/RHSA-2018:0583
access.redhat.com/errata/RHSA-2018:0585
github.com/mruby/mruby/issues/3722
hackerone.com/reports/212241
lists.debian.org/debian-lts-announce/2018/07/msg00012.html
security.gentoo.org/glsa/201710-18
usn.ubuntu.com/3685-1/
www.debian.org/security/2017/dsa-4031
www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/