First published: Fri Dec 11 2009(Updated: )
Heap-based buffer overflow in the rb_str_justify function in string.c in Ruby 1.9.1 before 1.9.1-p376 allows context-dependent attackers to execute arbitrary code via unspecified vectors involving (1) String#ljust, (2) String#center, or (3) String#rjust. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | =1.9.1--preview_2 | |
Ruby | =1.9.1--p0 | |
Ruby | =1.9.1--rc2 | |
Ruby | =1.9.1--preview_1 | |
Ruby | =1.9.1--rc1 | |
Ruby | =1.9.1--p129 | |
Ruby | =1.9.1--p243 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4124 has a high severity rating due to its potential for allowing arbitrary code execution.
To fix CVE-2009-4124, upgrade Ruby to version 1.9.1-p376 or later.
Ruby versions 1.9.1 before 1.9.1-p376 are affected by CVE-2009-4124.
CVE-2009-4124 can be exploited to execute arbitrary code through certain string formatting methods.
Users of affected Ruby versions who process untrusted data could be vulnerable to CVE-2009-4124.