Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-3443Infinite Loop in Ruby

CWE-3998 documents7 sources
Severity
5.0MEDIUMNVD
EPSS
29.3%
top 3.40%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 14
Latest updateMay 2

Description

The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages1 packages

NVDruby-lang/ruby10 versions+9

🔴Vulnerability Details

2
GHSA
GHSA-v838-v88j-gw93: The regular expression engine (regex2022-05-02
CVEList
CVE-2008-3443: The regular expression engine (regex2008-08-14

💥Exploits & PoCs

1
Exploit-DB
Ruby 1.9 - regex engine Remote Socket Memory Leak2008-08-13

📋Vendor Advisories

3
Ubuntu
Ruby vulnerability2008-12-16
Ubuntu
Ruby vulnerabilities2008-10-10
Red Hat
ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)2008-08-14

💬Community

1
Bugzilla
CVE-2008-3443 ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)2008-08-15
CVE-2008-3443 — Infinite Loop in Ruby-lang Ruby | cvebase