CVE-2017-6181Improper Input Validation in Ruby

Severity
7.5HIGHNVD
EPSS
0.7%
top 28.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3
Latest updateMay 17

Description

The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular expression.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

NVDruby-lang/ruby2.4.0

🔴Vulnerability Details

2
GHSA
GHSA-5pfp-rwpx-xgfx: The parse_char_class function in regparse2022-05-17
CVEList
CVE-2017-6181: The parse_char_class function in regparse2017-04-03

📋Vendor Advisories

1
Red Hat
ruby: Stack overflow in parse_char_class() in Onigmo2017-02-20

💬Community

1
Bugzilla
CVE-2017-6181 ruby: Stack overflow in parse_char_class() in Onigmo2017-04-19
CVE-2017-6181 — Improper Input Validation in Ruby | cvebase