CVE-2018-8778
Find out more about CVE-2018-8778 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
This issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 4.8 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L |
| Attack Vector | Network |
| Attack Complexity | High |
| Privileges Required | None |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | Low |
| Integrity Impact | None |
| Availability Impact | Low |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Subscription Asset Manager 1 | ruby193-ruby | Will not fix |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-ruby23-ruby | Affected |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-ruby25-ruby | Affected |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-ruby22-ruby | Will not fix |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-ruby24-ruby | Affected |
| Red Hat Enterprise Linux 7 | ruby | Affected |
| Red Hat Enterprise Linux 6 | ruby | Will not fix |
| Red Hat Enterprise Linux 5 | ruby | Will not fix |
Mitigation
Vulnerable code when String#unpack's argument is attacker controlled.
In the unpack format string argemument, manual sanitization can be done by preventing the number following '@' to overflow to a negative number. See https://dev.to/sqreenio/an-in-depth-look-at-cve-2018-8878-or-why-integer-overflows-are-still-a-thing-1n01 for mitigation details.
