CVE-2012-4466

Severity CVSS v4.0:
Pending analysis
Type:
CWE-264 Permissions, Privileges, and Access Control
Publication date:
25/04/2013
Last modified:
11/04/2025

Description

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p160:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p173:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p174:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p248:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p249:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p299:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p301:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p302:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p330:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p334:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p352:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:1.8.7:p357:*:*:*:*:*:*