[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-28739Date: (C)2022-05-11   (M)2024-05-02


There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 4.3
Exploit Score: 3.9Exploit Score: 8.6
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/29
http://seclists.org/fulldisclosure/2022/Oct/30
http://seclists.org/fulldisclosure/2022/Oct/42
https://hackerone.com/reports/1248108
https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html
https://security-tracker.debian.org/tracker/CVE-2022-28739
https://security.gentoo.org/glsa/202401-27
https://security.netapp.com/advisory/ntap-20220624-0002/
https://support.apple.com/kb/HT213488
https://support.apple.com/kb/HT213493
https://support.apple.com/kb/HT213494
https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/

CWE    1
CWE-125
OVAL    37
oval:org.secpod.oval:def:4501061
oval:org.secpod.oval:def:707137
oval:org.secpod.oval:def:508191
oval:org.secpod.oval:def:507144
...

© SecPod Technologies