CVE-2012-4464Incorrect Privilege Assignment in Ruby

Severity
5.0MEDIUMNVD
EPSS
0.4%
top 40.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 25
Latest updateMay 17

Description

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.

CVSS vector

AV:N/AC:L/C:N/I:P/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages1 packages

NVDruby-lang/ruby1.9.3, 2.0, 2.0.0+2

🔴Vulnerability Details

2
GHSA
GHSA-gjcp-rx5c-g849: Ruby 12022-05-17
CVEList
CVE-2012-4464: Ruby 12013-04-25

📋Vendor Advisories

3
Ubuntu
Ruby vulnerabilities2012-10-23
Ubuntu
Ruby vulnerabilities2012-10-10
Red Hat
1.9.3: Possibility to bypass Ruby's $SAFE (level 4) semantics2012-09-28

💬Community

3
Bugzilla
CVE-2012-4481 ruby: Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects2012-10-05
Bugzilla
CVE-2012-4464 CVE-2012-4466 ruby: various flaws [fedora-all]2012-10-03
Bugzilla
CVE-2012-4464 ruby 1.9.3: Possibility to bypass Ruby's $SAFE (level 4) semantics2012-10-03
CVE-2012-4464 — Incorrect Privilege Assignment in Ruby | cvebase