Vulnerability Details : CVE-2018-8779
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
Vulnerability category: Input validation
Products affected by CVE-2018-8779
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:2.6.0:preview1:*:*:*:*:*:*
Threat overview for CVE-2018-8779
Top countries where our scanners detected CVE-2018-8779
Top open port discovered on systems with this issue
80
IPs affected by CVE-2018-8779 3,630
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2018-8779!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2018-8779
0.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-8779
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-8779
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-8779
-
https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
[SECURITY] [DLA 1358-1] ruby1.9.1 security updateMailing List;Third Party Advisory
-
https://www.debian.org/security/2018/dsa-4259
Debian -- Security Information -- DSA-4259-1 ruby2.3Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3731
RHSA-2018:3731 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3729
RHSA-2018:3729 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
[SECURITY] [DLA 1421-1] ruby2.1 security updateMailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1042004
Apple macOS/OS X Multiple Remote Code Execution, Denial of Service, and Information Disclosure Attacks and Local Privilege Escalation Attacks - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
Ruby 2.2.10 ReleasedPatch;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:3730
RHSA-2018:3730 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
[security-announce] openSUSE-SU-2019:1771-1: important: Security update
-
https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
Ruby 2.3.7 ReleasedPatch;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
[SECURITY] [DLA 1359-1] ruby1.8 security updateThird Party Advisory
-
https://usn.ubuntu.com/3626-1/
USN-3626-1: Ruby vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Ruby 2.5.1 ReleasedPatch;Vendor Advisory
-
https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
Ruby 2.4.4 ReleasedPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/103767
Ruby CVE-2018-8779 Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocketVendor Advisory
-
https://access.redhat.com/errata/RHSA-2019:2028
RHSA-2019:2028 - Security Advisory - Red Hat Customer Portal
Jump to