First published: Tue Jul 17 2018(Updated: )
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mruby Mruby | =1.4.1 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14337 is a vulnerability in mruby 1.4.1 that contains a signed integer overflow, possibly leading to out-of-bounds memory access.
Yes, mruby version 1.4.1 is affected by CVE-2018-14337.
The severity of CVE-2018-14337 is high with a CVSS score of 7.5.
To fix the vulnerability CVE-2018-14337, update to a version of mruby that is not affected.
You can find more information about CVE-2018-14337 at the following references: [Link 1](https://github.com/mruby/mruby/issues/4062), [Link 2](https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html).