CVE-2008-2376

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE.  NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
ruby-langruby
1.8.6.230
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby1.8
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
not-affected
karmic
not-affected
jaunty
not-affected
intrepid
not-affected
hardy
Fixed 1.8.6.111-2ubuntu1.2
released
gutsy
Fixed 1.8.6.36-1ubuntu3.3
released
feisty
Fixed 1.8.5-4ubuntu2.3
released
dapper
Fixed 1.8.4-1ubuntu1.6
released
ruby1.9
oneiric
dne
natty
dne
maverick
dne
lucid
Fixed 1.9.0.2-7
released
karmic
Fixed 1.9.0.2-7
released
jaunty
Fixed 1.9.0.2-7
released
intrepid
Fixed 1.9.0.2-7
released
hardy
ignored
gutsy
ignored
feisty
ignored
dapper
ignored
Common Weakness Enumeration
References