An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/91234 | |
| http://www.talosintelligence.com/reports/TALOS-2016-0034/ | Exploit Technical Description Third Party Advisory VDB Entry |
| https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html | |
| http://www.securityfocus.com/bid/91234 | |
| http://www.talosintelligence.com/reports/TALOS-2016-0034/ | Exploit Technical Description Third Party Advisory VDB Entry |
| https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-01-06 21:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-2339
Mitre link : CVE-2016-2339
CVE.ORG link : CVE-2016-2339
JSON object : View
Products Affected
ruby-lang
- ruby
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
