First published: Thu Jul 10 2014(Updated: )
A possible stack-based buffer overflow flaw was reported in the Ruby encodes() function from pack.c. From the bug report, this function may be used on data received from a server, and could be triggered remotely. As the affected stack buffer is a static size on the stack, FORTIFY_SOURCE may help mitigate this issue to only be a denial of service. The original report suggests older versions (such as 1.9.3) are not affected. Bug report: <a href="https://bugs.ruby-lang.org/issues/10019">https://bugs.ruby-lang.org/issues/10019</a> CVE request: <a href="http://www.openwall.com/lists/oss-security/2014/07/09/13">http://www.openwall.com/lists/oss-security/2014/07/09/13</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | >1.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1118158 is classified as a high severity vulnerability due to the potential for remote exploitation via buffer overflow.
To fix REDHAT-BUG-1118158, update your Ruby installation to a version later than 1.9.3 that includes the patch for this vulnerability.
If exploited, REDHAT-BUG-1118158 could allow an attacker to execute arbitrary code on the affected system.
Ruby versions prior to 1.9.3 are affected by REDHAT-BUG-1118158.
A potential workaround for REDHAT-BUG-1118158 is to use FORTIFY_SOURCE to improve stack protection, but this does not completely eliminate the risk.