CVE-2018-10199Use After Free in Mruby

CWE-416Use After Free4 documents4 sources
Severity
9.8CRITICALNVD
EPSS
1.4%
top 19.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 18
Latest updateMay 14

Description

In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

debiandebian/mruby< mruby 1.4.0+20180418+git54905e98-1 (bookworm)
Debianmruby/mruby< 1.4.0+20180418+git54905e98-1+3
NVDmruby/mruby1.4.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xpq9-m45f-g29q: In versions of mruby up to and including 12022-05-14
OSV
CVE-2018-10199: In versions of mruby up to and including 12018-04-18

📋Vendor Advisories

1
Debian
CVE-2018-10199: mruby - In versions of mruby up to and including 1.4.0, a use-after-free vulnerability e...2018