Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-10191

Опубликовано: 17 апр. 2018
Источник: debian
EPSS Низкий

Описание

In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mrubyfixed1.4.0+20180418+git54905e98-1package
mrubyno-dsajessiepackage

Примечания

  • https://github.com/mruby/mruby/issues/3995

  • https://github.com/mruby/mruby/commit/1905091634a6a2925c911484434448e568330626

EPSS

Процентиль: 79%
0.01293
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 8 лет назад

In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code.

CVSS3: 9.8
nvd
почти 8 лет назад

In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code.

CVSS3: 9.8
github
почти 4 года назад

In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code.

EPSS

Процентиль: 79%
0.01293
Низкий