Vulnerability Description
Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Ruby | 2.2.2 |
References
- http://www.securityfocus.com/bid/91233
- http://www.talosintelligence.com/reports/TALOS-2016-0031/ExploitTechnical DescriptionThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/08/msg00028.html
- https://security.gentoo.org/glsa/201710-18
- http://www.securityfocus.com/bid/91233
- http://www.talosintelligence.com/reports/TALOS-2016-0031/ExploitTechnical DescriptionThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/08/msg00028.html
- https://security.gentoo.org/glsa/201710-18
FAQ
What is CVE-2016-2337?
CVE-2016-2337 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution.
How severe is CVE-2016-2337?
CVE-2016-2337 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-2337?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Ruby.