Critical severity9.1NVD Advisory· Published Sep 15, 2017· Updated May 13, 2026
CVE-2017-0898
CVE-2017-0898
Description
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
Affected products
1- HackerOne/Rubyv5Range: Versions before 2.4.2, 2.3.5, and 2.2.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- github.com/mruby/mruby/issues/3722nvdExploitThird Party Advisory
- hackerone.com/reports/212241nvdExploitThird Party Advisory
- www.securityfocus.com/bid/100862nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039363nvdThird Party AdvisoryVDB Entry
- www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/nvdVendor Advisory
- access.redhat.com/errata/RHSA-2017:3485nvd
- access.redhat.com/errata/RHSA-2018:0378nvd
- access.redhat.com/errata/RHSA-2018:0583nvd
- access.redhat.com/errata/RHSA-2018:0585nvd
- lists.debian.org/debian-lts-announce/2018/07/msg00012.htmlnvd
- security.gentoo.org/glsa/201710-18nvd
- usn.ubuntu.com/3685-1/nvd
- www.debian.org/security/2017/dsa-4031nvd
News mentions
0No linked articles in our index yet.