ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.
References
Link | Resource |
---|---|
https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a | Patch Third Party Advisory |
https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c | Patch Third Party Advisory |
https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a | Patch Third Party Advisory |
https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a - Patch, Third Party Advisory | |
References | () https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c - Patch, Third Party Advisory |
Information
Published : 2018-06-22 18:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000201
Mitre link : CVE-2018-1000201
CVE.ORG link : CVE-2018-1000201
JSON object : View
Products Affected
ruby-ffi_project
- ruby-ffi
microsoft
- windows
CWE
CWE-426
Untrusted Search Path