Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2008-2726

Back to Search

SUSE Linux Security Vulnerability: CVE-2008-2726

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
06/24/2008
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

Solution(s)

  • suse-upgrade-ruby
  • suse-upgrade-ruby-devel
  • suse-upgrade-ruby-doc-html
  • suse-upgrade-ruby-doc-ri
  • suse-upgrade-ruby-examples
  • suse-upgrade-ruby-test-suite
  • suse-upgrade-ruby-tk
  • suse-upgrade-suse-release

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;