[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-2726Date: (C)2008-06-24   (M)2023-12-22


Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.8
Exploit Score: 10.0
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
SECTRACK-1020347
http://www.securityfocus.com/archive/1/493688/100/0/threaded
BID-29903
SECUNIA-30802
SECUNIA-30831
SECUNIA-30867
SECUNIA-30875
SECUNIA-30894
SECUNIA-31062
SECUNIA-31090
SECUNIA-31181
SECUNIA-31256
SECUNIA-31687
SECUNIA-33178
ADV-2008-1907
ADV-2008-1981
APPLE-SA-2008-06-30
DSA-1612
DSA-1618
FEDORA-2008-5649
GLSA-200812-17
MDVSA-2008:140
MDVSA-2008:141
MDVSA-2008:142
RHSA-2008:0561
SSA:2008-179-01
SUSE-SR:2008:017
USN-621-1
http://www.redhat.com/archives/fedora-security-commits/2008-June/msg00005.html
http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/
http://support.apple.com/kb/HT2163
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=17460
http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206
http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/
http://www.ruby-forum.com/topic/157034
http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/
http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html
http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html
https://bugs.launchpad.net/ubuntu/+source/ruby1.8/+bug/241657
https://issues.rpath.com/browse/RPL-2626
oval:org.mitre.oval:def:9959
ruby-rbarysplice-begrlen-code-execution(43351)

CPE    6
cpe:/o:canonical:ubuntu_linux:6.06::~~lts~~~
cpe:/o:canonical:ubuntu_linux:7.04
cpe:/o:debian:debian_linux:4.0
cpe:/o:canonical:ubuntu_linux:7.10
...
CWE    1
CWE-189
OVAL    4
oval:org.secpod.oval:def:301246
oval:org.mitre.oval:def:7871
oval:org.secpod.oval:def:301570
oval:org.mitre.oval:def:7922
...

© SecPod Technologies