CVE-2018-8779
Find out more about CVE-2018-8779 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 3.7 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
| Attack Vector | Network |
| Attack Complexity | High |
| Privileges Required | None |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity Impact | Low |
| Availability Impact | None |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Subscription Asset Manager 1 | ruby193-ruby | Will not fix |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-ruby23-ruby | Affected |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-ruby25-ruby | Affected |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-ruby22-ruby | Will not fix |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-ruby24-ruby | Affected |
| Red Hat Enterprise Linux 7 | ruby | Affected |
| Red Hat Enterprise Linux 6 | ruby | Not affected |
| Red Hat Enterprise Linux 5 | ruby | Not affected |
Mitigation
It is possible to test for presence of the NULL byte manually prior to call the affected methods.
