5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.006 Low
EPSS
Percentile
79.2%
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5,
and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size,
buffer, exception: false), the method resizes the buffer to fit the
requested size, but no data is copied. Thus, the buffer string provides the
previous value of the heap. This may expose possibly sensitive data from
the interpreter.
Author | Note |
---|---|
leosilva | vulnerable code introduced in 2.5.0 |
github.com/ruby/ruby/commit/61b7f86248bd121be2e83768be71ef289e8e5b90
launchpad.net/bugs/cve/CVE-2020-10933
nvd.nist.gov/vuln/detail/CVE-2020-10933
security-tracker.debian.org/tracker/CVE-2020-10933
ubuntu.com/security/notices/USN-4882-1
www.cve.org/CVERecord?id=CVE-2020-10933
www.ruby-lang.org/en/news/2020/03/31/heap-exposure-in-socket-cve-2020-10933/
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.006 Low
EPSS
Percentile
79.2%