First published: Thu Mar 29 2018(Updated: )
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
Credit: CVE-2017-0898 CVE-2017-10784 CVE-2017-14033 CVE-2017-14064 CVE-2017-17405 CVE-2017-17742 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 CVE-2017-0898 CVE-2017-10784 CVE-2017-14033 CVE-2017-14064 CVE-2017-17405 CVE-2017-17742 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | >=2.2.0<2.2.10 | |
Ruby-lang Ruby | >=2.3.0<2.3.7 | |
Ruby-lang Ruby | >=2.4.0<2.4.4 | |
Ruby-lang Ruby | >=2.5.0<2.5.1 | |
Ruby-lang Ruby | =2.6.0-preview1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
Apple macOS Mojave | <10.14.1 | 10.14.1 |
Apple High Sierra | ||
Apple Sierra | ||
Apple macOS High Sierra | <10.13.6 | 10.13.6 |
Apple El Capitan | ||
redhat/ruby | <2.2.10 | 2.2.10 |
redhat/ruby | <2.3.7 | 2.3.7 |
redhat/ruby | <2.4.4 | 2.4.4 |
redhat/ruby | <2.5.1 | 2.5.1 |
debian/ruby1.8 | ||
debian/ruby1.9.1 | ||
debian/ruby2.1 | ||
debian/ruby2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-8778 is a vulnerability in Ruby that allows an attacker to trigger a buffer under-read in the String#unpack method.
CVE-2018-8778 has a severity rating of 7.5, which is considered high.
CVE-2018-8778 affects Ruby versions before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1.
To fix CVE-2018-8778, update Ruby to version 2.2.10, 2.3.7, 2.4.4, 2.5.1, or apply the appropriate security patches.
More information about CVE-2018-8778 can be found at the following references: [link1], [link2], [link3].