Vulnerability Description
In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mruby | Mruby | <= 1.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433Patch
- https://github.com/mruby/mruby/issues/4001Third Party Advisory
- https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433Patch
- https://github.com/mruby/mruby/issues/4001Third Party Advisory
FAQ
What is CVE-2018-10199?
CVE-2018-10199 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to exe...
How severe is CVE-2018-10199?
CVE-2018-10199 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-10199?
Check the references section above for vendor advisories and patch information. Affected products include: Mruby Mruby.