SB2017091537 - Information disclosure in ruby (Alpine package)
Published: September 15, 2017
Security Bulletin ID
SB2017091537
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Information disclosure
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Information disclosure (CVE-ID: CVE-2017-14064)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to an issue with using strdup in ext/json/ext/generator/generator.c during a JSON generate call. A remote attacker can send a specially crafted request, stop strdup after encountering a '' byte, returning a pointer to a string of length zero, which is not the length stored in space_len and expose arbitrary memory.
Successful exploitation of the vulnerability results in information disclosure.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=247ca66997e7e154df1a7fbf2d521cdf0e055200
- https://git.alpinelinux.org/aports/commit/?id=473dbc72ff1dad4cee848e9e9359b85d382daaaa
- https://git.alpinelinux.org/aports/commit/?id=9634aa1a2e1e9a1ecd421f6308a3e5e799531370
- https://git.alpinelinux.org/aports/commit/?id=a81871a4d4e0e81d47e0753d7661e774f69a4222