5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.011 Low
EPSS
Percentile
84.3%
Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows
context-dependent attackers to bypass safe-level restrictions and modify
untainted strings via the (1) exc_to_s or (2) name_err_to_s API function,
which marks the string as tainted, a different vulnerability than
CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005
regression.
Author | Note |
---|---|
mdeslaur | affects 1.9.3p0 and newer |
www.openwall.com/lists/oss-security/2012/10/03
www.openwall.com/lists/oss-security/2012/10/03/9
launchpad.net/bugs/cve/CVE-2012-4464
nvd.nist.gov/vuln/detail/CVE-2012-4464
security-tracker.debian.org/tracker/CVE-2012-4464
ubuntu.com/security/notices/USN-1602-1
ubuntu.com/security/notices/USN-1614-1
www.cve.org/CVERecord?id=CVE-2012-4464