CVE-2014-4975Improper Restriction of Operations within the Bounds of a Memory Buffer in Ruby

Severity
5.0MEDIUMNVD
EPSS
3.4%
top 12.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 15
Latest updateMay 17

Description

Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages5 packages

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 12.04, 14.04, 14.10

🔴Vulnerability Details

4
GHSA
GHSA-gxj7-mcpg-jpr6: Off-by-one error in the encodes function in pack2022-05-17
CVEList
CVE-2014-4975: Off-by-one error in the encodes function in pack2014-11-15
OSV
ruby1.8, ruby1.9.1, ruby2.0, ruby2.1 vulnerabilities2014-11-04
OSV
CVE-2014-4975: Off-by-one error in the encodes function in pack2014-07-17

📋Vendor Advisories

2
Ubuntu
Ruby vulnerabilities2014-11-04
Red Hat
ruby: off-by-one stack-based buffer overflow in the encodes() function2014-07-09

💬Community

2
Bugzilla
CVE-2014-4975 ruby: off-by-one stack-based buffer overflow in the encodes() function [fedora-all]2014-07-17
Bugzilla
CVE-2014-4975 ruby: off-by-one stack-based buffer overflow in the encodes() function2014-07-10
CVE-2014-4975 — Ruby-lang Ruby vulnerability | cvebase