Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-28739


There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.


Published

2022-05-09T18:15:08.540

Last Modified

2024-11-21T06:57:50.467

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-125

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ruby-lang ruby < 2.6.10 Yes
Application ruby-lang ruby < 2.7.6 Yes
Application ruby-lang ruby < 3.0.4 Yes
Application ruby-lang ruby < 3.1.2 Yes
Operating System debian debian_linux 9.0 Yes
Operating System debian debian_linux 10.0 Yes
Operating System debian debian_linux 11.0 Yes
Operating System apple macos < 11.7.1 Yes
Operating System apple macos < 12.6.1 Yes

References