Lucene search

K
rubygemsRubySecRUBY:RUBY-2008-2376
HistoryJun 29, 2008 - 8:00 p.m.

More ruby integer overflows (rb_ary_fill / Array#fill)

2008-06-2920:00:00
RubySec
rubysec.com
9

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Integer overflow in the rb_ary_fill function in array.c in Ruby before
revision 17756 allows context-dependent attackers to cause a denial of
service (crash) or possibly have unspecified other impact via a call to the
Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE.
NOTE: this issue exists because of an incomplete fix for other closely
related integer overflows.

Affected configurations

Vulners
Node
rubyrubyRange1.8.6.2851.8.7.0
OR
rubyrubyRange1.8.7.701.8.8.0
OR
rubyrubyRange<1.9.0
VendorProductVersionCPE
rubyruby*cpe:2.3:a:ruby:ruby:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P