The str_buf_cat function in string.c in Ruby 1.9.3, 2.0.0, and 2.1 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/93505 | vdb entry |
http://www.securityfocus.com/bid/67705 | vdb entry |
https://bugs.ruby-lang.org/issues/9709 | vendor advisory |
http://seclists.org/oss-sec/2014/q2/375 | mailing list |
http://seclists.org/oss-sec/2014/q2/362 | mailing list |