Skip to main content

Ruby Floating Point Parsing Buffer Overflow Vulnerability

Last Update Date: 25 Nov 2013 10:03 Release Date: 25 Nov 2013 3748 Views

RISK: High Risk

TYPE: Web services - Web Servers

TYPE: Web Servers

A vulnerability has been identified in Ruby, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an error when converting strings to floating point values and can be exploited to cause a heap-based buffer overflow via a specially crafted string.

Successful exploitation may allow execution of arbitrary code.


Impact

  • Remote Code Execution

System / Technologies affected

  • Ruby 1.9.x
  • Ruby 2.0.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to a fixed version.

Vulnerability Identifier


Source

 


Related Link