[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2018-14337 -- mruby

ID: oval:org.secpod.oval:def:2000920Date: (C)2019-04-22   (M)2022-05-13
Class: VULNERABILITYFamily: unix




The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.

Platform:
Debian 8.x
Debian 9.x
Product:
mruby
Reference:
CVE-2018-14337
CVE    1
CVE-2018-14337
CPE    3
cpe:/a:mruby:mruby
cpe:/o:debian:debian_linux:8.x
cpe:/o:debian:debian_linux:9.x

© SecPod Technologies