The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
References
Link Resource
https://github.com/mruby/mruby/issues/4062 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html Mailing List Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-07-17T03:00:00

Updated: 2022-05-06T10:06:46

Reserved: 2018-07-16T00:00:00


Link: CVE-2018-14337

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-07-17T03:29:00.227

Modified: 2022-05-12T20:12:40.610


Link: CVE-2018-14337

JSON object: View

cve-icon Redhat Information

No data.

CWE