Executive Summary

Informations
Name CVE-2014-4975 First vendor Publication 2014-11-15
Vendor Cve Last vendor Modification 2017-08-29

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28303
 
Oval ID: oval:org.mitre.oval:def:28303
Title: ELSA-2014-1912 -- ruby security update (moderate)
Description: [2.0.0.353-22] - Fix REXML billion laughs attack via parameter entity expansion (CVE-2014-8080). Resolves: rhbz#1163998 - REXML incomplete fix for CVE-2014-8080 (CVE-2014-8090). Resolves: rhbz#1163998 [2.0.0.353-21] - Fix off-by-one stack-based buffer overflow in the encodes() function (CVE-2014-4975) Resolves: rhbz#1163998 [2.0.0.353-21] - Fix FTBFS with new tzdata Related: rhbz#1163998
Family: unix Class: patch
Reference(s): ELSA-2014-1912
CVE-2014-8080
CVE-2014-8090
CVE-2014-4975
Version: 3
Platform(s): Oracle Linux 7
Product(s): ruby
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 951
Os 3
Os 2
Os 1
Os 1
Os 1
Os 1

Nessus® Vulnerability Scanner

Date Description
2018-11-21 Name : The remote EulerOS Virtualization host is missing multiple security updates.
File : EulerOS_SA-2018-1374.nasl - Type : ACT_GATHER_INFO
2017-05-01 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-527.nasl - Type : ACT_GATHER_INFO
2017-04-21 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2017-1067-1.nasl - Type : ACT_GATHER_INFO
2015-04-16 Name : The remote Debian host is missing a security update.
File : debian_DLA-200.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-129.nasl - Type : ACT_GATHER_INFO
2015-02-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3157.nasl - Type : ACT_GATHER_INFO
2014-12-02 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1912.nasl - Type : ACT_GATHER_INFO
2014-12-02 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20141126_ruby_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2014-11-27 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1912.nasl - Type : ACT_GATHER_INFO
2014-11-27 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1912.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-225.nasl - Type : ACT_GATHER_INFO
2014-11-11 Name : The remote Fedora host is missing a security update.
File : fedora_2014-14096.nasl - Type : ACT_GATHER_INFO
2014-11-05 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2397-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/68474
CONFIRM http://advisories.mageia.org/MGASA-2014-0472.html
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-286720...
https://bugs.ruby-lang.org/issues/10019
https://bugzilla.redhat.com/show_bug.cgi?id=1118158
DEBIAN http://www.debian.org/security/2015/dsa-3157
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2015:129
MLIST http://www.openwall.com/lists/oss-security/2014/07/09/13
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1912.html
http://rhn.redhat.com/errata/RHSA-2014-1913.html
http://rhn.redhat.com/errata/RHSA-2014-1914.html
UBUNTU http://www.ubuntu.com/usn/USN-2397-1
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/94706

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Date Informations
2021-05-04 12:33:02
  • Multiple Updates
2021-04-22 01:40:06
  • Multiple Updates
2020-05-23 01:52:41
  • Multiple Updates
2020-05-23 00:41:42
  • Multiple Updates
2018-11-01 12:05:41
  • Multiple Updates
2018-10-31 01:05:43
  • Multiple Updates
2018-05-16 12:04:07
  • Multiple Updates
2017-08-29 09:24:40
  • Multiple Updates
2017-05-02 13:24:37
  • Multiple Updates
2017-04-22 13:25:52
  • Multiple Updates
2016-12-13 09:24:38
  • Multiple Updates
2016-11-29 00:24:56
  • Multiple Updates
2016-10-12 09:24:05
  • Multiple Updates
2016-04-27 01:04:01
  • Multiple Updates
2015-04-23 09:27:43
  • Multiple Updates
2015-04-18 13:26:46
  • Multiple Updates
2015-03-31 13:28:41
  • Multiple Updates
2015-03-12 09:23:32
  • Multiple Updates
2015-02-11 13:23:56
  • Multiple Updates
2014-12-03 13:28:22
  • Multiple Updates
2014-12-03 09:27:10
  • Multiple Updates
2014-11-28 13:27:32
  • Multiple Updates
2014-11-27 13:28:34
  • Multiple Updates
2014-11-17 17:24:03
  • Multiple Updates
2014-11-16 00:27:13
  • First insertion