CVE Vulnerabilities

CVE-2017-0898

Use of Externally-Controlled Format String

Published: Sep 15, 2017 | Modified: Apr 20, 2025
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:P
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
RubyRuby-lang2.2.0 (including)2.2.0 (including)
RubyRuby-lang2.2.1 (including)2.2.1 (including)
RubyRuby-lang2.2.2 (including)2.2.2 (including)
RubyRuby-lang2.2.3 (including)2.2.3 (including)
RubyRuby-lang2.2.4 (including)2.2.4 (including)
RubyRuby-lang2.2.5 (including)2.2.5 (including)
RubyRuby-lang2.2.6 (including)2.2.6 (including)
RubyRuby-lang2.2.7 (including)2.2.7 (including)
RubyRuby-lang2.3.0 (including)2.3.0 (including)
RubyRuby-lang2.3.1 (including)2.3.1 (including)
RubyRuby-lang2.3.2 (including)2.3.2 (including)
RubyRuby-lang2.3.3 (including)2.3.3 (including)
RubyRuby-lang2.3.4 (including)2.3.4 (including)
RubyRuby-lang2.4.0 (including)2.4.0 (including)
RubyRuby-lang2.4.1 (including)2.4.1 (including)
Red Hat Enterprise Linux 7RedHatruby-0:2.0.0.648-33.el7_4*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-ruby24-ruby-0:2.4.2-86.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-ruby22-ruby-0:2.2.9-19.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-ruby23-ruby-0:2.3.6-67.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-ruby24-ruby-0:2.4.2-86.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-ruby22-ruby-0:2.2.9-19.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-ruby23-ruby-0:2.3.6-67.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby24-ruby-0:2.4.2-86.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby22-ruby-0:2.2.9-19.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby23-ruby-0:2.3.6-67.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-ruby24-ruby-0:2.4.2-86.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-ruby22-ruby-0:2.2.9-19.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-ruby23-ruby-0:2.3.6-67.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-ruby24-ruby-0:2.4.2-86.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-ruby22-ruby-0:2.2.9-19.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-ruby23-ruby-0:2.3.6-67.el7*
Ruby1.9.1Ubuntutrusty*
Ruby2.0Ubuntutrusty*
Ruby2.3Ubuntuartful*
Ruby2.3Ubuntuesm-infra/xenial*
Ruby2.3Ubuntuupstream*
Ruby2.3Ubuntuxenial*
Ruby2.3Ubuntuzesty*

Potential Mitigations

References