Vulnerability Description
Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Ruby | <= 1.8.4 |
| Debian | Debian Linux | 4.0 |
| Canonical | Ubuntu Linux | 6.06 |
Related Weaknesses (CWE)
References
- http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprisThird Party Advisory
- http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlThird Party Advisory
- http://secunia.com/advisories/30802Third Party Advisory
- http://secunia.com/advisories/30831Third Party Advisory
- http://secunia.com/advisories/30867Third Party Advisory
- http://secunia.com/advisories/30875Third Party Advisory
- http://secunia.com/advisories/30894Third Party Advisory
- http://secunia.com/advisories/31062Third Party Advisory
- http://secunia.com/advisories/31090Third Party Advisory
- http://secunia.com/advisories/31181Third Party Advisory
- http://secunia.com/advisories/31256Third Party Advisory
- http://secunia.com/advisories/31687Third Party Advisory
- http://secunia.com/advisories/33178Third Party Advisory
- http://security.gentoo.org/glsa/glsa-200812-17.xmlThird Party Advisory
FAQ
What is CVE-2008-2726?
CVE-2008-2726 is a vulnerability with a CVSS score of 7.8 (HIGH). Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_rep...
How severe is CVE-2008-2726?
CVE-2008-2726 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-2726?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Ruby, Debian Debian Linux, Canonical Ubuntu Linux.