CVE-2012-4464

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466.  NOTE: this issue might exist because of a CVE-2011-1005 regression.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
VendorProductVersion
ruby-langruby
1.9.3
ruby-langruby
1.9.3:p0
ruby-langruby
1.9.3:p125
ruby-langruby
1.9.3:p194
ruby-langruby
2.0
ruby-langruby
2.0.0
ruby-langruby
2.0.0:p0
ruby-langruby
2.0.0:preview1
ruby-langruby
2.0.0:preview2
ruby-langruby
2.0.0:rc1
ruby-langruby
2.0.0:rc2
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby1.8
quantal
not-affected
precise
not-affected
oneiric
not-affected
natty
not-affected
lucid
not-affected
hardy
ignored
ruby1.9
quantal
dne
precise
dne
oneiric
dne
natty
dne
maverick
dne
lucid
not-affected
hardy
not-affected
ruby1.9.1
quantal
Fixed 1.9.3.194-1ubuntu1.1
released
precise
Fixed 1.9.3.0-1ubuntu2.3
released
oneiric
not-affected
natty
not-affected
lucid
not-affected
hardy
dne
Common Weakness Enumeration