CVE-2017-14064CVE-2017-14064

Affected configuration(s):

cpe:/a:ruby-lang:ruby:2.2.7
cpe:/a:ruby-lang:ruby:2.3.0
cpe:/a:ruby-lang:ruby:2.3.0:preview1
cpe:/a:ruby-lang:ruby:2.3.0:preview2
cpe:/a:ruby-lang:ruby:2.3.1
cpe:/a:ruby-lang:ruby:2.3.2
cpe:/a:ruby-lang:ruby:2.3.3
cpe:/a:ruby-lang:ruby:2.3.4
cpe:/a:ruby-lang:ruby:2.4.0
cpe:/a:ruby-lang:ruby:2.4.0:preview1
cpe:/a:ruby-lang:ruby:2.4.0:preview2
cpe:/a:ruby-lang:ruby:2.4.0:preview3
cpe:/a:ruby-lang:ruby:2.4.0:rc1
cpe:/a:ruby-lang:ruby:2.4.1

Date published: 2017-08-31T13:29:00.183-04:00

Date last modified: 2017-11-08T21:29:01.903-05:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://www.securityfocus.com/bid/100890

Summary: Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a ‘’ byte, returning a pointer to a string of length zero, which is not the length stored in space_len.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.