Lucene search

K
ubuntucveUbuntu.comUB:CVE-2008-2376
HistoryJul 08, 2008 - 12:00 a.m.

CVE-2008-2376

2008-07-0800:00:00
ubuntu.com
ubuntu.com
6

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.021 Low

EPSS

Percentile

88.9%

Integer overflow in the rb_ary_fill function in array.c in Ruby before
revision 17756 allows context-dependent attackers to cause a denial of
service (crash) or possibly have unspecified other impact via a call to the
Array#fill method with a start (aka beg) argument greater than
ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for
other closely related integer overflows.

Bugs

Notes

Author Note
jdstrand from oss-security, need to make sure that the following patches: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13397 http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=17688 http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=17756 believed to not be as severe due to input code path
OSVersionArchitecturePackageVersionFilename
ubuntu6.06noarchruby1.8< 1.8.4-1ubuntu1.6UNKNOWN
ubuntu7.04noarchruby1.8< 1.8.5-4ubuntu2.3UNKNOWN
ubuntu7.10noarchruby1.8< 1.8.6.36-1ubuntu3.3UNKNOWN
ubuntu8.04noarchruby1.8< 1.8.6.111-2ubuntu1.2UNKNOWN
ubuntu8.10noarchruby1.9< 1.9.0.2-7UNKNOWN
ubuntu9.04noarchruby1.9< 1.9.0.2-7UNKNOWN
ubuntu9.10noarchruby1.9< 1.9.0.2-7UNKNOWN
ubuntu10.04noarchruby1.9< 1.9.0.2-7UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.021 Low

EPSS

Percentile

88.9%