Vulnerability Description
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Ruby | <= 2.2.7 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.4 |
| Redhat | Enterprise Linux Server Eus | 7.4 |
| Redhat | Enterprise Linux Server Tus | 7.4 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/100890Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039363Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1042004Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:3485Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0378Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0583Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0585Third Party Advisory
- https://bugs.ruby-lang.org/issues/13853Issue TrackingPatchVendor Advisory
- https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85Issue TrackingPatchThird Party Advisory
- https://hackerone.com/reports/209949ExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201710-18Third Party Advisory
- https://usn.ubuntu.com/3685-1/Third Party Advisory
- https://www.debian.org/security/2017/dsa-3966Third Party Advisory
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/Vendor Advisory
FAQ
What is CVE-2017-14064?
CVE-2017-14064 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which w...
How severe is CVE-2017-14064?
CVE-2017-14064 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-14064?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Ruby, Debian Debian Linux, Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.