Vulnerability CVE-2017-14064: Information

Description

Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.

Severity: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Published: Aug. 31, 2017
Modified: May 13, 2019
Error type identifier: CWE-119

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://hackerone.com/reports/209949
  • Exploit
  • Third Party Advisory
https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85
  • Issue Tracking
  • Patch
  • Third Party Advisory
https://bugs.ruby-lang.org/issues/13853
  • Issue Tracking
  • Patch
  • Vendor Advisory
1039363
  • Third Party Advisory
  • VDB Entry
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
  • Vendor Advisory
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
  • Vendor Advisory
100890
  • Third Party Advisory
  • VDB Entry
GLSA-201710-18
  • Third Party Advisory
DSA-3966
  • Third Party Advisory
RHSA-2017:3485
  • Third Party Advisory
RHSA-2018:0378
  • Third Party Advisory
RHSA-2018:0585
  • Third Party Advisory
RHSA-2018:0583
  • Third Party Advisory
USN-3685-1
  • Third Party Advisory
[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
  • Mailing List
  • Third Party Advisory
1042004
  • Third Party Advisory
  • VDB Entry
    1. Configuration 1

      cpe:2.3:a:ruby-lang:ruby:2.3.4:*:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.4.1:*:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.4.0:preview1:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.3.0:preview1:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.3.2:*:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
      End including
      2.2.7

      cpe:2.3:a:ruby-lang:ruby:2.3.1:*:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.3.3:*:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.3.0:preview2:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.3.0:*:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.4.0:preview3:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.4.0:preview2:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.4.0:*:*:*:*:*:*:*

      cpe:2.3:a:ruby-lang:ruby:2.4.0:rc1:*:*:*:*:*:*

      Configuration 2

      cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

      Configuration 4

      cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*