Improper input validation in RubyGems - CVE-2017-0898
Published: September 15, 2017
Vulnerability identifier: #VU8447
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-0898
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Ruby
Affected software:
RubyGems
RubyGems
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS condition or obtain potentially sensitive information on the target system.
The weakness exists due to buffer underrun in the Kernel.sprintf() method. A remote attacker can provide a specially crafted format string value to cause the target interpreter to crash or potentially access data from the heap.
Successful exploitation of the vulnerability results in information disclosure or denial of service.
The weakness exists due to buffer underrun in the Kernel.sprintf() method. A remote attacker can provide a specially crafted format string value to cause the target interpreter to crash or potentially access data from the heap.
Successful exploitation of the vulnerability results in information disclosure or denial of service.
How to mitigate CVE-2017-0898
Update to version 2.2.8 or 2.3.5.