CVE-2013-4164

EUVD-2013-4089
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
Affected Products (NVD)
VendorProductVersion
ruby-langruby
1.8
ruby-langruby
1.9
ruby-langruby
1.9.1
ruby-langruby
1.9.2
ruby-langruby
1.9.3
ruby-langruby
2.0.0
ruby-langruby
2.1:preview1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby1.8
lucid
ignored
precise
Fixed 1.8.7.352-2ubuntu1.4
released
quantal
Fixed 1.8.7.358-4ubuntu0.4
released
raring
Fixed 1.8.7.358-7ubuntu1.2
released
saucy
Fixed 1.8.7.358-7ubuntu2.1
released
trusty
dne
ruby1.9
lucid
ignored
precise
dne
quantal
dne
raring
dne
saucy
dne
trusty
dne
ruby1.9.1
lucid
ignored
precise
Fixed 1.9.3.0-1ubuntu2.8
released
quantal
Fixed 1.9.3.194-1ubuntu1.6
released
raring
Fixed 1.9.3.194-8.1ubuntu1.2
released
saucy
Fixed 1.9.3.194-8.1ubuntu2.1
released
trusty
Fixed 1.9.3.448-1ubuntu2
released
ruby2.0
lucid
dne
precise
dne
quantal
dne
raring
dne
saucy
ignored
trusty
Fixed 2.0.0.343-1ubuntu1
released
References