CVE-2016-10193

The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
References
Link Resource
http://www.openwall.com/lists/oss-security/2017/01/31/14 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/02/02/5 Mailing List Patch Third Party Advisory
https://github.com/dejan/espeak-ruby/issues/7 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/01/31/14 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/02/02/5 Mailing List Patch Third Party Advisory
https://github.com/dejan/espeak-ruby/issues/7 Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:espeak-ruby_project:espeak-ruby:*:*:*:*:*:ruby:*:*

History

21 Nov 2024, 02:43

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2017/01/31/14 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/01/31/14 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/02/02/5 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/02/02/5 - Mailing List, Patch, Third Party Advisory
References () https://github.com/dejan/espeak-ruby/issues/7 - Mailing List, Patch, Third Party Advisory () https://github.com/dejan/espeak-ruby/issues/7 - Mailing List, Patch, Third Party Advisory

Information

Published : 2017-03-03 15:59

Updated : 2024-11-21 02:43


NVD link : CVE-2016-10193

Mitre link : CVE-2016-10193

CVE.ORG link : CVE-2016-10193


JSON object : View

Products Affected

espeak-ruby_project

  • espeak-ruby
CWE
CWE-284

Improper Access Control