#VU8447 Improper input validation in RubyGems - CVE-2017-0898
Published: September 15, 2017
Vulnerability identifier: #VU8447
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-0898
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
RubyGems
RubyGems
Software vendor:
Ruby
Ruby
Description
The vulnerability allows a remote attacker to cause DoS condition or obtain potentially sensitive information on the target system.
The weakness exists due to buffer underrun in the Kernel.sprintf() method. A remote attacker can provide a specially crafted format string value to cause the target interpreter to crash or potentially access data from the heap.
Successful exploitation of the vulnerability results in information disclosure or denial of service.
The weakness exists due to buffer underrun in the Kernel.sprintf() method. A remote attacker can provide a specially crafted format string value to cause the target interpreter to crash or potentially access data from the heap.
Successful exploitation of the vulnerability results in information disclosure or denial of service.
Remediation
Update to version 2.2.8 or 2.3.5.