In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
2018-04-03T22:29:00.773
2024-11-21T04:14:17.550
Modified
CVSSv3.0: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ruby-lang | ruby | < 2.2.10 | Yes |
Application | ruby-lang | ruby | < 2.3.7 | Yes |
Application | ruby-lang | ruby | < 2.4.4 | Yes |
Application | ruby-lang | ruby | < 2.5.1 | Yes |
Application | ruby-lang | ruby | 2.6.0 | Yes |
Operating System | canonical | ubuntu_linux | 14.04 | Yes |
Operating System | canonical | ubuntu_linux | 16.04 | Yes |
Operating System | canonical | ubuntu_linux | 17.10 | Yes |
Operating System | debian | debian_linux | 7.0 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | redhat | enterprise_linux | 6.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | Yes |
Operating System | redhat | enterprise_linux | 7.4 | Yes |
Operating System | redhat | enterprise_linux | 7.5 | Yes |
Operating System | redhat | enterprise_linux | 7.6 | Yes |