Описание
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
Отчет
This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
CloudForms Management Engine 5 | mingw-ruby | Affected | ||
OpenShift Enterprise 1 | ruby193-ruby | Will not fix | ||
Red Hat Enterprise Linux 4 | ruby | Not affected | ||
Red Hat Enterprise Linux 5 | ruby | Not affected | ||
Red Hat Enterprise Linux 7 | ruby | Not affected | ||
Red Hat OpenStack Platform 4 | ruby193-ruby | Affected | ||
Red Hat Satellite 6 | ruby193-ruby | Affected | ||
Red Hat Subscription Asset Manager | ruby193-ruby | Affected | ||
CloudForms Management Engine 5.x | cfme | Fixed | RHSA-2014:0215 | 11.03.2014 |
CloudForms Management Engine 5.x | ruby193-ruby | Fixed | RHSA-2014:0215 | 11.03.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS2
Связанные уязвимости
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 bef ...
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
EPSS
7.5 High
CVSS2