First published: Thu Jul 10 2014(Updated: )
A possible stack-based buffer overflow flaw was reported in the Ruby encodes() function from pack.c. From the bug report, this function may be used on data received from a server, and could be triggered remotely. As the affected stack buffer is a static size on the stack, FORTIFY_SOURCE may help mitigate this issue to only be a denial of service. The original report suggests older versions (such as 1.9.3) are not affected. Bug report: <a href="https://bugs.ruby-lang.org/issues/10019">https://bugs.ruby-lang.org/issues/10019</a> CVE request: <a href="http://www.openwall.com/lists/oss-security/2014/07/09/13">http://www.openwall.com/lists/oss-security/2014/07/09/13</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | <=1.9.3 | |
Ruby | =2.0 | |
Ruby | =2.0.0 | |
Ruby | =2.0.0-p0 | |
Ruby | =2.0.0-p195 | |
Ruby | =2.0.0-p247 | |
Ruby | =2.0.0-preview1 | |
Ruby | =2.0.0-preview2 | |
Ruby | =2.0.0-rc1 | |
Ruby | =2.0.0-rc2 | |
Ruby | =2.1 | |
Ruby | =2.1-preview1 | |
Ruby | =2.1.1 | |
Ruby | =2.1.2 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-4975 is considered high due to the potential for a stack-based buffer overflow that may be triggered remotely.
To fix CVE-2014-4975, upgrade Ruby to version 2.1 or later, as earlier versions are affected by this vulnerability.
CVE-2014-4975 affects Ruby versions up to and including 1.9.3 and specific 2.0.x versions.
Yes, CVE-2014-4975 can be exploited remotely if an application using the vulnerable Ruby function handles untrusted input.
The impact of CVE-2014-4975 may allow an attacker to execute arbitrary code on the affected system, compromising its security.