Ruby Floating Point Parsing Buffer Overflow Vulnerability
Last Update Date:
25 Nov 2013 10:03
Release Date:
25 Nov 2013
3748
Views
RISK: High Risk
TYPE: Web services - Web Servers
A vulnerability has been identified in Ruby, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an error when converting strings to floating point values and can be exploited to cause a heap-based buffer overflow via a specially crafted string.
Successful exploitation may allow execution of arbitrary code.
Impact
- Remote Code Execution
System / Technologies affected
- Ruby 1.9.x
- Ruby 2.0.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to a fixed version.
Vulnerability Identifier
Source
Related Link
Share with