9.1

CVE-2017-0898

Exploit

Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.

Data is provided by the National Vulnerability Database (NVD)
Ruby-langRuby Version2.2.0
Ruby-langRuby Version2.2.1
Ruby-langRuby Version2.2.2
Ruby-langRuby Version2.2.3
Ruby-langRuby Version2.2.4
Ruby-langRuby Version2.2.5
Ruby-langRuby Version2.2.6
Ruby-langRuby Version2.2.7
Ruby-langRuby Version2.3.0
Ruby-langRuby Version2.3.1
Ruby-langRuby Version2.3.2
Ruby-langRuby Version2.3.3
Ruby-langRuby Version2.3.4
Ruby-langRuby Version2.4.0
Ruby-langRuby Version2.4.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.85% 0.741
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.1 3.9 5.2
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:P/I:N/A:P
CWE-134 Use of Externally-Controlled Format String

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.