Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2008-2726

Опубликовано: 24 июн. 2008
Источник: nvd
CVSS2: 7.8
EPSS Низкий

Описание

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
Версия до 1.8.4 (включая)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
Версия от 1.8.5 (включая) до 1.8.5.231 (исключая)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
Версия от 1.8.6 (включая) до 1.8.6.230 (исключая)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
Версия от 1.8.7 (включая) до 1.8.7.22 (исключая)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
Версия от 1.9.0 (включая) до 1.9.0.2 (исключая)
Конфигурация 2
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*

EPSS

Процентиль: 80%
0.01449
Низкий

7.8 High

CVSS2

Дефекты

CWE-189

Связанные уязвимости

ubuntu
почти 17 лет назад

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

redhat
около 17 лет назад

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

debian
почти 17 лет назад

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and e ...

github
около 3 лет назад

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

oracle-oval
почти 17 лет назад

ELSA-2008-0561: ruby security update (MODERATE)

EPSS

Процентиль: 80%
0.01449
Низкий

7.8 High

CVSS2

Дефекты

CWE-189