Vulnerability Details : CVE-2014-3916
The str_buf_cat function in string.c in Ruby 1.9.3, 2.0.0, and 2.1 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2014-3916
- cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:1.9.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3916
0.49%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 63 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3916
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-3916
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3916
-
https://bugs.ruby-lang.org/issues/9709
Bug #9709: Large string causes SEGV with x64-mingw32 - Ruby master - Ruby Issue Tracking SystemVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/93505
Ruby str_buf_cat() denial of service CVE-2014-3916 Vulnerability Report
-
http://seclists.org/oss-sec/2014/q2/375
oss-sec: Re: Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV with x64-mingw32
-
http://www.securityfocus.com/bid/67705
Ruby 'string.c' Remote Memory Corruption Vulnerability
-
http://seclists.org/oss-sec/2014/q2/362
oss-sec: Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV with x64-mingw32
Jump to