Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-2376

Опубликовано: 09 июл. 2008
Источник: ubuntu
Приоритет: low
EPSS Средний
CVSS2: 7.5

Описание

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

РелизСтатусПримечание
dapper

released

1.8.4-1ubuntu1.6
devel

not-affected

1.8.7.72-1
feisty

released

1.8.5-4ubuntu2.3
gutsy

released

1.8.6.36-1ubuntu3.3
hardy

released

1.8.6.111-2ubuntu1.2
intrepid

not-affected

1.8.7.72-1
jaunty

not-affected

1.8.7.72-1
karmic

not-affected

1.8.7.72-1
lucid

not-affected

1.8.7.72-1
maverick

not-affected

1.8.7.72-1

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

pulled 2010-07-27
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

ignored

end of life
intrepid

released

1.9.0.2-7
jaunty

released

1.9.0.2-7
karmic

released

1.9.0.2-7
lucid

released

1.9.0.2-7
maverick

DNE

pulled 2010-07-27

Показывать по

EPSS

Процентиль: 94%
0.14263
Средний

7.5 High

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

nvd
почти 17 лет назад

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

debian
почти 17 лет назад

Integer overflow in the rb_ary_fill function in array.c in Ruby before ...

github
около 3 лет назад

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

oracle-oval
почти 17 лет назад

ELSA-2008-0561: ruby security update (MODERATE)

EPSS

Процентиль: 94%
0.14263
Средний

7.5 High

CVSS2