SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Ruby Vendors:   Matsumoto, Yukihiro
Ruby Heap Overflow in rb_str_justify() May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1023322
SecurityTracker URL:  http://securitytracker.com/id/1023322
CVE Reference:   CVE-2009-4124   (Links to External Site)
Date:  Dec 11 2009
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.9.1 prior to 1.9.1-p376
Description:   A vulnerability was reported in Ruby. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted data to potentially trigger a heap overflow in the String#ljust, String#center, and String#rjust functions and execute arbitrary code on the target system. The code will run with the privileges of the target application or service.

The impact depends on the application using the affected function.

The vulnerability resides in rb_str_justify() in 'string.c'.

The Ruby 1.8 series is not affected.

Emmanouel Kellinis of KPMG London reported this vulnerability.

Impact:   A remote user may be able to execute arbitrary code on the target system, depending on the application using the vulnerable Ruby function.
Solution:   The vendor has issued a fix (1.9.1-p376).

The vendor's advisory is available at:

http://www.ruby-lang.org/en/news/2009/12/07/heap-overflow-in-string/

Vendor URL:  www.ruby-lang.org/en/news/2009/12/07/heap-overflow-in-string/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC