Vulnerability Name: | CVE-2008-2376 (CCN-43523) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2008-07-01 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2008-07-01 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. Note: this issue exists because of an incomplete fix for other closely related integer overflows. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 6.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
4.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-2376 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: RHSA-2008-0561 Moderate: ruby security update Source: CCN Type: RHSA-2008-0562 Moderate: ruby security update Source: CCN Type: SA30924 Ruby "rb_ary_fill()" Denial of Service Vulnerability Source: CCN Type: SN-2008-02 Ruby rb_ary_fill() DOS Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: ASA-2008-295 ruby security update (RHSA-2008-0561) Source: CCN Type: ASA-2008-297 ruby security update (RHSA-2008-0562) Source: CCN Type: Ruby Programming Language SVN Repository revision 17472, revision 17756 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: DEBIAN Type: DSA-1612 ruby1.8 -- several vulnerabilities Source: DEBIAN Type: DSA-1618 ruby1.9 -- several vulnerabilities Source: CCN Type: GLSA-200812-17 Ruby: Multiple vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Ruby Programming Language Web site Ruby Programming Language Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-30036 Ruby 'rb_ary_fill()' Remote Denial Of Service Vulnerability Source: CCN Type: USN-651-1 Ruby vulnerabilities Source: secalert@redhat.com Type: US Government Resource secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: XF Type: UNKNOWN ruby-rbaryfill-dos(43523) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Name: | CVE-2008-2376 (CCN-43681) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2008-06-30 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2008-06-30 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2008-06-30 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. Note: this issue exists because of an incomplete fix for other closely related integer overflows. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Other | ||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-2376 Source: CCN Type: RHSA-2008-0561 Moderate: ruby security update Source: CCN Type: RHSA-2008-0562 Moderate: ruby security update Source: CCN Type: SN-2008-02 Ruby rb_ary_fill() DOS Source: CCN Type: ASA-2008-295 ruby security update (RHSA-2008-0561) Source: CCN Type: ASA-2008-297 ruby security update (RHSA-2008-0562) Source: CCN Type: Ruby Programming Language SVN Repository revision 17472, revision 17756 Source: DEBIAN Type: DSA-1612 ruby1.8 -- several vulnerabilities Source: DEBIAN Type: DSA-1618 ruby1.9 -- several vulnerabilities Source: CCN Type: GLSA-200812-17 Ruby: Multiple vulnerabilities Source: CCN Type: Ruby Programming Language Web site Ruby Programming Language Source: CCN Type: USN-651-1 Ruby vulnerabilities Source: XF Type: UNKNOWN ruby-rbaryfill-arrayfill-unspecified(43681) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |