Lucene search

K
rubygemsRubySecRUBY:RUBY-2008-2376
HistoryJun 29, 2008 - 8:00 p.m.

More ruby integer overflows (rb_ary_fill / Array#fill)

2008-06-2920:00:00
RubySec
www.openwall.com
9

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Integer overflow in the rb_ary_fill function in array.c in Ruby before
revision 17756 allows context-dependent attackers to cause a denial of
service (crash) or possibly have unspecified other impact via a call to the
Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE.
NOTE: this issue exists because of an incomplete fix for other closely
related integer overflows.

Affected configurations

Vulners
Node
rubyrubyRange1.8.01.8.6.286
OR
rubyrubyRange1.8.01.8.7.71
OR
rubyrubyRange1.9.0
VendorProductVersionCPE
rubyruby*cpe:2.3:a:ruby:ruby:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P