An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/91234 | |
http://www.talosintelligence.com/reports/TALOS-2016-0034/ | Exploit Technical Description Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2017-01-06T21:00:00
Updated: 2018-07-14T09:57:01
Reserved: 2016-02-12T00:00:00
Link: CVE-2016-2339
JSON object: View
NVD Information
Status : Modified
Published: 2017-01-06T21:59:00.493
Modified: 2018-07-15T01:29:00.413
Link: CVE-2016-2339
JSON object: View
Redhat Information
No data.
CWE