First published: Wed Apr 18 2018(Updated: )
In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mruby Mruby | <=1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10199 is a use-after-free vulnerability in mruby up to and including version 1.4.0, which can allow an attacker to execute arbitrary code when Ruby code is run.
CVE-2018-10199 has a severity rating of critical with a score of 9.8.
An attacker can exploit CVE-2018-10199 by causing Ruby code to be run, allowing them to potentially execute arbitrary code.
Yes, a fix for CVE-2018-10199 is available in the mruby version 1.4.1 or later.
You can find more information about CVE-2018-10199 at the following references: [GitHub Commit](https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433) and [GitHub Issue](https://github.com/mruby/mruby/issues/4001).