CVE-2013-4164
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
23/11/2013
Last modified:
11/04/2025
Description
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:ruby-lang:ruby:1.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00009.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00028.html
- http://osvdb.org/100113
- http://rhn.redhat.com/errata/RHSA-2013-1763.html
- http://rhn.redhat.com/errata/RHSA-2013-1764.html
- http://rhn.redhat.com/errata/RHSA-2013-1767.html
- http://rhn.redhat.com/errata/RHSA-2014-0011.html
- http://rhn.redhat.com/errata/RHSA-2014-0215.html
- http://secunia.com/advisories/55787
- http://secunia.com/advisories/57376
- http://www.debian.org/security/2013/dsa-2809
- http://www.debian.org/security/2013/dsa-2810
- http://www.securityfocus.com/bid/63873
- http://www.ubuntu.com/usn/USN-2035-1
- https://puppet.com/security/cve/cve-2013-4164
- https://support.apple.com/kb/HT6536
- https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-1-9-3-p484-is-released
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-2-0-0-p353-is-released
- http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00009.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00028.html
- http://osvdb.org/100113
- http://rhn.redhat.com/errata/RHSA-2013-1763.html
- http://rhn.redhat.com/errata/RHSA-2013-1764.html
- http://rhn.redhat.com/errata/RHSA-2013-1767.html
- http://rhn.redhat.com/errata/RHSA-2014-0011.html
- http://rhn.redhat.com/errata/RHSA-2014-0215.html
- http://secunia.com/advisories/55787
- http://secunia.com/advisories/57376
- http://www.debian.org/security/2013/dsa-2809
- http://www.debian.org/security/2013/dsa-2810
- http://www.securityfocus.com/bid/63873
- http://www.ubuntu.com/usn/USN-2035-1
- https://puppet.com/security/cve/cve-2013-4164
- https://support.apple.com/kb/HT6536
- https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-1-9-3-p484-is-released
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-2-0-0-p353-is-released