First published: Sun Nov 16 2014(Updated: )
The str_buf_cat function in string.c in Ruby 1.9.3, 2.0.0, and 2.1 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby on Rails | =1.9.3 | |
Ruby on Rails | =2.0.0 | |
Ruby on Rails | =2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3916 has a severity rating that may lead to denial of service through a segmentation fault.
To fix CVE-2014-3916, upgrade to a patched version of Ruby that is not affected by this vulnerability.
CVE-2014-3916 affects Ruby versions 1.9.3, 2.0.0, and 2.1.0.
CVE-2014-3916 enables context-dependent attackers to perform a denial of service attack by causing a crash.
No, CVE-2014-3916 is not a code execution vulnerability but rather a denial of service vulnerability.