CVE-2017-9527Use After Free in Mruby

CWE-416Use After Free4 documents4 sources
Severity
7.8HIGHNVD
EPSS
0.2%
top 57.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 11
Latest updateMay 7

Description

The mark_context_stack function in gc.c in mruby through 1.2.0 allows attackers to cause a denial of service (heap-based use-after-free and application crash) or possibly have unspecified other impact via a crafted .rb file.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/mruby< mruby 1.3.0-1 (bookworm)
Debianmruby/mruby< 1.3.0-1+3
NVDmruby/mruby1.2.0

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fxr6-v647-jgmq: The mark_context_stack function in gc2022-05-07
OSV
CVE-2017-9527: The mark_context_stack function in gc2017-06-11

📋Vendor Advisories

1
Debian
CVE-2017-9527: mruby - The mark_context_stack function in gc.c in mruby through 1.2.0 allows attackers ...2017