Mruby

Mruby

42 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.6%
  • Veröffentlicht 21.07.2020 15:15:14
  • Zuletzt bearbeitet 21.11.2024 05:06:20

mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 11.01.2020 03:15:11
  • Zuletzt bearbeitet 21.11.2024 05:36:16

In mruby 2.1.0, there is a use-after-free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c.

Exploit
  • EPSS 0.51%
  • Veröffentlicht 11.01.2020 03:15:11
  • Zuletzt bearbeitet 21.11.2024 05:36:16

In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str_len_to_dbl in string.c.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 11.01.2020 03:15:10
  • Zuletzt bearbeitet 21.11.2024 05:36:16

In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c.

Exploit
  • EPSS 0.36%
  • Veröffentlicht 17.07.2018 03:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:51

The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.

Exploit
  • EPSS 0.66%
  • Veröffentlicht 12.06.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:51

An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c.

  • EPSS 0.27%
  • Veröffentlicht 12.06.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:51

An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber.

  • EPSS 0.28%
  • Veröffentlicht 12.06.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:51

An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag).

Exploit
  • EPSS 0.57%
  • Veröffentlicht 05.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:56

The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other im...

  • EPSS 1.44%
  • Veröffentlicht 18.04.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:00

In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.