Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
https://usn.ubuntu.com/3685-1/ | vendor advisory |
https://hackerone.com/reports/212241 | third party advisory exploit |
https://access.redhat.com/errata/RHSA-2018:0585 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0378 | vendor advisory |
https://www.debian.org/security/2017/dsa-4031 | vendor advisory |
http://www.securityfocus.com/bid/100862 | vdb entry third party advisory |
http://www.securitytracker.com/id/1039363 | vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2017:3485 | vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html | mailing list |
https://access.redhat.com/errata/RHSA-2018:0583 | vendor advisory |
https://github.com/mruby/mruby/issues/3722 | third party advisory exploit |
https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/ | vendor advisory |
https://security.gentoo.org/glsa/201710-18 | vendor advisory |