CVE-2018-1000201

ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:ruby-ffi_project:ruby-ffi:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a - Patch, Third Party Advisory () https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a - Patch, Third Party Advisory
References () https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c - Patch, Third Party Advisory () https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c - Patch, Third Party Advisory

Information

Published : 2018-06-22 18:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-1000201

Mitre link : CVE-2018-1000201

CVE.ORG link : CVE-2018-1000201


JSON object : View

Products Affected

ruby-ffi_project

  • ruby-ffi

microsoft

  • windows
CWE
CWE-426

Untrusted Search Path