Vulnerability Details : CVE-2017-0898
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
Vulnerability category: OverflowMemory CorruptionInformation leak
Products affected by CVE-2017-0898
- cpe:2.3:a:ruby-lang:ruby:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.2.7:*:*:*:*:*:*:*
Threat overview for CVE-2017-0898
Top countries where our scanners detected CVE-2017-0898
Top open port discovered on systems with this issue
80
IPs affected by CVE-2017-0898 2,290
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-0898!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-0898
1.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-0898
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:P |
10.0
|
4.9
|
NIST | |
9.1
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2017-0898
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by:
- nvd@nist.gov (Primary)
- support@hackerone.com (Secondary)
References for CVE-2017-0898
-
https://access.redhat.com/errata/RHSA-2017:3485
RHSA-2017:3485 - Security Advisory - Red Hat Customer Portal
-
https://www.debian.org/security/2017/dsa-4031
Debian -- Security Information -- DSA-4031-1 ruby2.3
-
http://www.securitytracker.com/id/1039363
Ruby Multiple Flaws Let Remote Users Inject Log Data, Deny Service, and Obtain Potentially Sensitive Information from the Heap - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/
CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintfVendor Advisory
-
https://github.com/mruby/mruby/issues/3722
Heap use-after-free in mrb_str_format · Issue #3722 · mruby/mruby · GitHubExploit;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
[SECURITY] [DLA 1421-1] ruby2.1 security update
-
http://www.securityfocus.com/bid/100862
Ruby CVE-2017-0898 Buffer Underrun VulnerabilityThird Party Advisory;VDB Entry
-
https://hackerone.com/reports/212241
#212241 sprintf combined format string attackExploit;Third Party Advisory
-
https://usn.ubuntu.com/3685-1/
USN-3685-1: Ruby vulnerabilities | Ubuntu security notices
-
https://access.redhat.com/errata/RHSA-2018:0585
RHSA-2018:0585 - Security Advisory - Red Hat Customer Portal
-
https://security.gentoo.org/glsa/201710-18
Ruby: Multiple vulnerabilities (GLSA 201710-18) — Gentoo security
-
https://access.redhat.com/errata/RHSA-2018:0378
RHSA-2018:0378 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2018:0583
RHSA-2018:0583 - Security Advisory - Red Hat Customer Portal
Jump to