CVE-2013-4164

Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
ruby-langruby
1.8
ruby-langruby
1.9
ruby-langruby
1.9.1
ruby-langruby
1.9.2
ruby-langruby
1.9.3
ruby-langruby
2.0.0
ruby-langruby
2.1:preview1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby1.8
trusty
dne
saucy
Fixed 1.8.7.358-7ubuntu2.1
released
raring
Fixed 1.8.7.358-7ubuntu1.2
released
quantal
Fixed 1.8.7.358-4ubuntu0.4
released
precise
Fixed 1.8.7.352-2ubuntu1.4
released
lucid
ignored
ruby1.9
trusty
dne
saucy
dne
raring
dne
quantal
dne
precise
dne
lucid
ignored
ruby1.9.1
trusty
Fixed 1.9.3.448-1ubuntu2
released
saucy
Fixed 1.9.3.194-8.1ubuntu2.1
released
raring
Fixed 1.9.3.194-8.1ubuntu1.2
released
quantal
Fixed 1.9.3.194-1ubuntu1.6
released
precise
Fixed 1.9.3.0-1ubuntu2.8
released
lucid
ignored
ruby2.0
trusty
Fixed 2.0.0.343-1ubuntu1
released
saucy
ignored
raring
dne
quantal
dne
precise
dne
lucid
dne
References