Executive Summary

Informations
Name CVE-2009-4124 First vendor Publication 2009-12-11
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in the rb_str_justify function in string.c in Ruby 1.9.1 before 1.9.1-p376 allows context-dependent attackers to execute arbitrary code via unspecified vectors involving (1) String#ljust, (2) String#center, or (3) String#rjust. NOTE: some of these details are obtained from third party information.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4124

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7

OpenVAS Exploits

Date Description
2010-02-19 Name : Ubuntu Update for ruby1.9 vulnerabilities USN-900-1
File : nvt/gb_ubuntu_USN_900_1.nasl
2009-12-23 Name : Ruby Interpreter Heap Overflow Vulnerability (Linux) - Dec09
File : nvt/secpod_ruby_heap_bof_vuln_lin_dec09.nasl
2009-12-23 Name : Ruby Interpreter Heap Overflow Vulnerability (Windows) - Dec09
File : nvt/secpod_ruby_heap_bof_vuln_win_dec09.nasl
2009-12-14 Name : FreeBSD Ports: ruby
File : nvt/freebsd_ruby11.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
60880 Ruby string.c rb_str_justify() Function Overflow

Nessus® Vulnerability Scanner

Date Description
2010-02-17 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-900-1.nasl - Type : ACT_GATHER_INFO
2009-12-10 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_eab8c3bde50c11de9cd0001a926c7637.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://secunia.com/advisories/37660
http://www.osvdb.org/60880
http://www.ruby-lang.org/en/news/2009/12/07/heap-overflow-in-string/
http://www.securityfocus.com/bid/37278
http://www.vupen.com/english/advisories/2009/3471
https://exchange.xforce.ibmcloud.com/vulnerabilities/54674
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-11-28 23:09:46
  • Multiple Updates
2024-11-28 12:20:18
  • Multiple Updates
2021-05-04 12:10:32
  • Multiple Updates
2021-04-22 01:10:59
  • Multiple Updates
2020-05-23 00:24:39
  • Multiple Updates
2017-08-17 09:22:48
  • Multiple Updates
2016-06-28 17:54:43
  • Multiple Updates
2016-04-26 19:17:08
  • Multiple Updates
2014-02-17 10:52:30
  • Multiple Updates
2013-05-11 00:01:43
  • Multiple Updates