First published: Fri Dec 11 2009(Updated: )
Heap-based buffer overflow in the rb_str_justify function in string.c in Ruby 1.9.1 before 1.9.1-p376 allows context-dependent attackers to execute arbitrary code via unspecified vectors involving (1) String#ljust, (2) String#center, or (3) String#rjust. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | =1.9.1--preview_2 | |
Ruby-lang Ruby | =1.9.1--p0 | |
Ruby-lang Ruby | =1.9.1--rc2 | |
Ruby-lang Ruby | =1.9.1--preview_1 | |
Ruby-lang Ruby | =1.9.1--rc1 | |
Ruby-lang Ruby | =1.9.1--p129 | |
Ruby-lang Ruby | =1.9.1--p243 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.