An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.
References
Link | Resource |
---|---|
http://www.talosintelligence.com/reports/TALOS-2016-0034/ | Exploit Technical Description Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/91234 | |
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-01-06 13:59
Updated : 2018-07-14 18:29
NVD link : CVE-2016-2339
Mitre link : CVE-2016-2339
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
ruby-lang
- ruby