Vulnerabilities > CVE-2016-2338 - Out-of-bounds Write vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An exploitable heap overflow vulnerability exists in the Psych::Emitter start_document function of Ruby. In Psych::Emitter start_document function heap buffer "head" allocation is made based on tags array length. Specially constructed object passed as element of tags array can increase this array size after mentioned allocation and cause heap overflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 | |
OS | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DLA-2158.NASL |
description | An exploitable heap overflow vulnerability exists in the Psych::Emitter startdocument function of Ruby. In Psych::Emitter startdocument function heap buffer |
last seen | 2020-03-26 |
modified | 2020-03-26 |
plugin id | 134915 |
published | 2020-03-26 |
reporter | This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/134915 |
title | Debian DLA-2158-1 : ruby2.1 security update |
Seebug
bulletinFamily exploit description ### DESCRIPTION An exploitable heap overflow vulnerability exists in the Psych::Emitter startdocument function of Ruby. In Psych::Emitter startdocument function heap buffer "head" allocation is made based on tags array length. Specially constructed object passed as element of tags array can increase this array size after mentioned allocation and cause heap overflow. ### TESTED VERSIONS Ruby 2.3.0 dev Ruby 2.2.2 ### PRODUCT URLs https://www.ruby-lang.org ### DETAILS ``` Line 138 static VALUE start_document(VALUE self, VALUE version, VALUE tags, VALUE imp) Line 139 { (...) Line 160 #ifdef HAVE_RUBY_ENCODING_H Line 161 rb_encoding * encoding = rb_utf8_encoding(); Line 162 #endif Line 163 Line 164 Check_Type(tags, T_ARRAY); Line 165 Line 166 head = xcalloc((size_t)RARRAY_LEN(tags), sizeof(yaml_tag_directive_t)); Line 167 tail = head; Line 168 Line 169 for(i = 0; i < RARRAY_LEN(tags); i++) { Line 170 VALUE tuple = RARRAY_PTR(tags)[i]; Line 171 VALUE name; Line 172 VALUE value; Line 173 Line 174 Check_Type(tuple, T_ARRAY); Line 175 Line 176 if(RARRAY_LEN(tuple) < 2) { Line 177 xfree(head); Line 178 rb_raise(rb_eRuntimeError, "tag tuple must be of length 2"); Line 179 } Line 180 name = RARRAY_PTR(tuple)[0]; Line 181 value = RARRAY_PTR(tuple)[1]; Line 182 #ifdef HAVE_RUBY_ENCODING_H Line 183 name = rb_str_export_to_enc(name, encoding); Line 184 value = rb_str_export_to_enc(value, encoding); Line 185 #endif Line 186 Line 187 tail->handle = (yaml_char_t *)StringValuePtr(name); Line 188 tail->prefix = (yaml_char_t *)StringValuePtr(value); Line 189 Line 190 tail++; Line 191 } Line 192 } ``` In Line 166 based on length of passed by user tags array, xcalloc allocates buffer for yamltagdirective_t structures. Later in the loop, each element of tags array is checked whether is in form of tuple, which here means [name,value]. name and value of this tuple is "converted" in two different ways: 1. Line 180,181 If encoding of name or value is different than utf-8 function rbstrexporttoenc returns NEW (very important) string object with proper encoding. [#2] Function does not check whether passed object is a String or not, as You can see there is no before check either. Passing e.g Integer value as name in tuple will case read access violation in search_nonascii function. For more details see #2 point in Crash analysis section. 2. Line 187,188 StringValuePtr function returns pointer to string or if passed object as argument is not a string, tries to convert it to string. Conversion is made via call to rbstrtostr so in consequences object vtable is checked for "tostr" method. Exploiting knowledge that StringValuePtr for non String object will call "tostr" method we can create properly constructed object which will implement this method and pass this object as a name or value for a tuple. During the execution of this method size of tags array declared as global variable will be increase. That operation later in Line 187,188 will cause heap overflow. To achieve this result we need to satisfy two constraints. Object passed as value or name in tuple needs to be/has: a) encoding field set to utf-8, in other way rbstrexporttoenc function will return new object, so we will lose controle over it b) not a String object and has implemented "tostr" method Solving a) As we dive deep into rbstrexporttoenc function we encounter rbencget_index function defined in encoding.c file. ``` Line 744 int Line 745 rb_enc_get_index(VALUE obj) { (...) Line 754 switch (BUILTIN_TYPE(obj)) { Line 755 as_default: Line 756 default: Line 757 case T_STRING: Line 758 case T_REGEXP: Line 759 i = ENCODING_GET_INLINED(obj); Line 760 if (i == ENCODING_INLINE_MAX) { Line 761 VALUE iv; Line 762 Line 763 iv = rb_ivar_get(obj, rb_id_encoding()); Line 764 i = NUM2INT(iv); Line 765 } Line 766 break; Line 767 case T_FILE: Line 768 tmp = rb_funcallv(obj, rb_intern("internal_encoding"), 0, 0); Line 769 if (NIL_P(tmp)) obj = rb_funcallv(obj, rb_intern("external_encoding"), 0, 0); Line 770 else obj = tmp; Line 771 if (NIL_P(obj)) break; Line 772 case T_DATA: Line 773 if (is_data_encoding(obj)) { Line 774 i = enc_check_encoding(obj); Line 775 } ``` There are at least 3 objects having encoding fields which we can use. I decided to use Regexp object in my PoC. b) To created with proper encoding Regex object we need to add to_str method ``` To see ready solution triggering this vulnerability take a glance on below PoC. ``` ### CRASH ANALYSIS ``` [+] Start [+] tags array size : 1 (...) head = xcalloc((size_t)RARRAY_LEN(tags), sizeof(yaml_tag_directive_t)); EIP> tail = head; 0:000> dv encoding = 0x009244c0 i = 0n0 self = 0x93a79c version = 0x93a788 tags = 0x93a850 imp = 1 head = 0x02e68d30 event = struct yaml_event_s tail = 0x02e68d30 version_directive = struct yaml_version_directive_s emitter = 0x02e5c198 0:000> !heap -p -a 0x02e68d30 address 02e68d30 found in _HEAP @ 900000 HEAP_ENTRY Size Prev Flags UserPtr UserSize - state 02e68d28 0004 0000 [00] 02e68d30 00008 - (busy) 0:000> !heap -x 0x02e68d30 Entry User Heap Segment Size PrevSize Unused Flags ----------------------------------------------------------------------------- 02e68d28 02e68d30 00900000 02e10000 20 48 18 busy extra fill 0:000> !heap -p -a 02e68d28+20 address 02e68d48 found in _HEAP @ 900000 HEAP_ENTRY Size Prev Flags UserPtr UserSize - state 02e68d48 0453 0000 [00] 02e68d50 02290 - (free) 0:000> dd 02e68d48 02e68d48 10d3affe 000609fd 009000c4 00907b28 02e68d58 feeefeee feeefeee feeefeee feeefeee 02e68d68 feeefeee feeefeee feeefeee feeefeee 02e68d78 feeefeee feeefeee feeefeee feeefeee 02e68d88 feeefeee feeefeee feeefeee feeefeee 02e68d98 feeefeee feeefeee feeefeee feeefeee 02e68da8 feeefeee feeefeee feeefeee feeefeee 02e68db8 feeefeee feeefeee feeefeee feeefeee 0:000> g [+] Increasing size of tags array [+] tags array size : 11 After couple iteration when "i" is equal: 0:000> dv i i = 0n4 0:000> !heap -p -a 02e68d28+20 address 02e68d48 found in _HEAP @ 900000 HEAP_ENTRY Size Prev Flags UserPtr UserSize - state 02e68d48 0ecd 0000 [00] 02e68d50 07660 - (free) 0:000> !heap -x 02e68d28+20 ERROR: Block 02e68d48 previous size acb5 does not match previous block size 4 HEAP 00900000 (Seg 02e10000) At 02e68d48 Error: invalid block Previous 0:000> dd 02e68d48 02e68d48 0093a560 0093a54c 0093a524 0093a4fc 02e68d58 0093a56c 0093a530 0093a4e0 0093a4a4 02e68d68 0093a440 0093a404 0093a3c8 0093a38c 02e68d78 0093a328 baadf00d baadf00d baadf00d 02e68d88 baadf00d baadf00d baadf00d baadf00d 02e68d98 baadf00d baadf00d abababab abababab 02e68da8 00000000 00000000 49d0aba0 180609f4 02e68db8 0093a850 0093a850 0093a850 0093a850 #2 Read access violation Change PoC line: $tags.push([obj,"tag:TALOS"]) to $tags.push([0x112233445566778899,"tag:TALOS"]) (b70.16b0): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=22334455 ebx=00000000 ecx=22334455 edx=22334458 esi=00000001 edi=00000000 eip=6386ae83 esp=0048f154 ebp=0048f160 iopl=0 nv up ei ng nz ac po cy cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010293 msvcr120_ruby230!search_nonascii+0x33: 6386ae83 0fb611 movzx edx,byte ptr [ecx] ds:002b:22334455=?? 0:000> kb ChildEBP RetAddr Args to Child 0048f160 6386af3c 22334455 88aaccee 77b75a90 msvcr120_ruby230!search_nonascii+0x33 [t:\projects\bugs\ruby_debug_x32\string.c @ 357] 0048f180 63869e47 22334455 66778899 00174460 msvcr120_ruby230!coderange_scan+0x2c [t:\projects\bugs\ruby_debug_x32\string.c @ 387] 0048f1b4 638699d2 02b3c020 00150000 00000000 msvcr120_ruby230!rb_enc_str_coderange+0x117 [t:\projects\bugs\ruby_debug_x32\string.c @ 516] 0048f224 63869968 02b3c020 00174460 001744c0 msvcr120_ruby230!rb_str_conv_enc_opts+0x62 [t:\projects\bugs\ruby_debug_x32\string.c @ 769] 0048f240 6386993d 02b3c020 00174460 001744c0 msvcr120_ruby230!rb_str_conv_enc+0x18 [t:\projects\bugs\ruby_debug_x32\string.c @ 828] 0048f254 62751a0d 02b3c020 001744c0 00000001 msvcr120_ruby230!rb_str_export_to_enc+0x1d [t:\projects\bugs\ruby_debug_x32\string.c @ 903] 0048f2f8 638a05b6 0018a72c 0018a718 0018a7e0 psych!start_document+0x30d [t:\projects\bugs\ruby_debug_x32\ext\psych\psych_emitter.c @ 183] 0048f310 638a1042 62751700 0018a72c 00000003 msvcr120_ruby230!call_cfunc_3+0x36 [t:\projects\bugs\ruby_debug_x32\vm_insnhelper.c @ 1269] 0048f3d8 638a12bc 00150c70 0057ffd0 02b52f80 msvcr120_ruby230!vm_call_cfunc_with_frame+0x2b2 [t:\projects\bugs\ruby_debug_x32\vm_insnhelper.c @ 1418] 0048f3ec 638a1592 00150c70 0057ffd0 02b52f80 msvcr120_ruby230!vm_call_cfunc+0x4c [t:\projects\bugs\ruby_debug_x32\vm_insnhelper.c @ 1513] 0048f490 6389dc94 00150c70 0057ffd0 02b52f80 msvcr120_ruby230!vm_call_method+0xa2 [t:\projects\bugs\ruby_debug_x32\vm_insnhelper.c @ 1729] 0048f4a4 638a53dc 00150c70 0057ffd0 02b52f80 msvcr120_ruby230!vm_call_general+0x14 [t:\projects\bugs\ruby_debug_x32\vm_insnhelper.c @ 1888] 0048fcc4 638ab7a8 00150c70 00000000 02b493f8 msvcr120_ruby230!vm_exec_core+0x286c [t:\projects\bugs\ruby_debug_x32\insns.def @ 1075] 0048fdb8 6389aeb7 00150c70 63848553 00150dbc msvcr120_ruby230!vm_exec+0x98 [t:\projects\bugs\ruby_debug_x32\vm.c @ 1455] 0048fdd0 6384857e 02b4fcec 3b2f0152 00000000 msvcr120_ruby230!rb_iseq_eval_main+0x27 [t:\projects\bugs\ruby_debug_x32\vm.c @ 1701] 0048fe74 63847378 02b4fcec 0048fe90 63846b50 msvcr120_ruby230!ruby_exec_internal+0x10e [t:\projects\bugs\ruby_debug_x32\eval.c @ 260] 0048fe80 63846b50 02b4fcec 3b67ff26 0048fea0 msvcr120_ruby230!ruby_exec_node+0x18 [t:\projects\bugs\ruby_debug_x32\eval.c @ 322] *** WARNING: Unable to verify checksum for ruby.exe 0048fe90 00e1103b 02b4fcec 00175590 0048fee0 msvcr120_ruby230!ruby_run_node+0x30 [t:\projects\bugs\ruby_debug_x32\eval.c @ 314] 0048fea0 00e11261 00000002 00174e80 00175590 ruby!main+0x3b [t:\projects\bugs\ruby_debug_x32\main.c @ 36] 0048fee0 75ab337a 7efde000 0048ff2c 77af92e2 ruby!__tmainCRTStartup+0xfd [f:\dd\vctools\crt\crtw32\dllstuff\crtexe.c @ 626] 0048feec 77af92e2 7efde000 64014142 00000000 kernel32!BaseThreadInitThunk+0xe 0048ff2c 77af92b5 00e112c9 7efde000 00000000 ntdll!__RtlUserThreadStart+0x70 0048ff44 00000000 00e112c9 7efde000 00000000 ntdll!_RtlUserThreadStart+0x1b ``` ### Vulnerable code: ``` static inline const char * search_nonascii(const char *p, const char *e) { #if SIZEOF_VOIDP == 8 # define NONASCII_MASK 0x8080808080808080ULL #elif SIZEOF_VOIDP == 4 # define NONASCII_MASK 0x80808080UL #endif #ifdef NONASCII_MASK if ((int)SIZEOF_VOIDP * 2 < e - p) { const uintptr_t *s, *t; const uintptr_t lowbits = SIZEOF_VOIDP - 1; s = (const uintptr_t*)(~lowbits & ((uintptr_t)p + lowbits)); while (p < (const char *)s) { > if (!ISASCII(*p)) return p; p++; } ``` ### TIMELINE * 2015-06-08 - Initial Discovery * 2015-06-30 - Vendor Notification * 2016-06-14 - Public Disclosure id SSV:96755 last seen 2017-11-19 modified 2017-10-20 published 2017-10-20 reporter Root source https://www.seebug.org/vuldb/ssvid-96755 title Ruby Psych::Emitter start_document Heap Overflow Vulnerability(CVE-2016-2338) bulletinFamily exploit description ### DESCRIPTION An exploitable User After Free vulnerability exists in the packpack function of Ruby. In packpack function each element of array which should be "pack", based on template string is converted to binary representation in proper way. If element is not compatible with corresponding to him format, element is converted to proper form. Exploiting this knowledge and fact that size of array used later in iteration is taken before loop, specially constructed object can be passed as element of "ary" and during conversion to pointed by template string format clear "ary" array triggering in next iteration use after free vulnerability. ### TESTED VERSIONS Ruby 2.3.0 dev Ruby 2.2.2 ### PRODUCT URLs https://www.ruby-lang.org ### DETAILS ``` Line 345 static VALUE Line 346 pack_pack(VALUE ary, VALUE fmt) Line 347 { (...) Line 361 StringValue(fmt); Line 362 p = RSTRING_PTR(fmt); Line 363 pend = p + RSTRING_LEN(fmt); Line 364 res = rb_str_buf_new(0); Line 365 Line 366 items = RARRAY_LEN(ary); Line 367 idx = 0; Line 368 Line 369 #define TOO_FEW (rb_raise(rb_eArgError, toofew), 0) Line 370 #define THISFROM (items > 0 ? RARRAY_AREF(ary, idx) : TOO_FEW) Line 371 #define NEXTFROM (items-- > 0 ? RARRAY_AREF(ary, idx++) : TOO_FEW) Line 372 Line 373 while (p < pend) { (...) Line 452 switch (type) { Line 453 case 'A': Line 454 case 'a': Line 455 case 'Z': Line 456 case 'B': Line 457 case 'b': Line 458 case 'H': Line 459 case 'h': Line 460 from = NEXTFROM; Line 461 if (NIL_P(from)) { Line 462 ptr = ""; Line 463 plen = 0; Line 464 } Line 465 else { Line 466 StringValue(from); Line 467 ptr = RSTRING_PTR(from); Line 468 plen = RSTRING_LEN(from); Line 469 OBJ_INFECT(res, from); Line 470 } ``` In Line 366 length of array contains elements to pack is taken. It's important to notice it that this length is read one time not each time during loop iteration because later we will exploit that fact. Next in Line 373 starts loop where each element from "ary" array is "pack" to corresponding form pointed by directives passed in "fmt" argument. For an example I chose to use "A" directives. Line 460 take another element from "ary" and treating it according with directive as a string. Before any operation is made on "from" object in Line 466 by calling StringValue function checks whether indeed "form" object is a String object. If "from" object is not a string "tostr" method is executed if exists. Having those two facts that: - "ary" object during iteration in while loop is not frozen and it's len was taken before loop, and now based on this value no matter whether array will be increased or decreased there will be so many iterations that specified in items variable. - passing object not being String with custom "tostr" method gives possibility to manipulate e.g "ary" content Attacker can create object and pass it in "ary" array as element, which implements "tostr" method which main purpose is to clear "ary" elements causing in next iteration Use After Free vulnerability. In example of usage "A" directives in next iteration when "ary" elements are released in Line 466 appears attempt to call "tostr" method on released memory. With proper spraying it can lead to code execution. Below PoC shows entire attack. ### CRASH ANALYSIS ``` 0:000> !analyze -v ******************************************************************************* * * * Exception Analysis * * * ******************************************************************************* *** WARNING: Unable to verify checksum for ruby.exe FAULTING_IP: msvcr120_ruby230!st_lookup+d [t:\projects\bugs\ruby_debug_x32\st.c @ 388] 674a6b1d 8b11 mov edx,dword ptr [ecx] EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff) ExceptionAddress: 674a6b1d (msvcr120_ruby230!st_lookup+0x0000000d) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 00000006 Attempt to read from address 00000006 FAULTING_THREAD: 00001cac DEFAULT_BUCKET_ID: NULL_CLASS_PTR_READ PROCESS_NAME: ruby.exe ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 00000006 READ_ADDRESS: 00000006 FOLLOWUP_IP: msvcr120_ruby230!st_lookup+d [t:\projects\bugs\ruby_debug_x32\st.c @ 388] 674a6b1d 8b11 mov edx,dword ptr [ecx] DETOURED_IMAGE: 1 NTGLOBALFLAG: 470 APPLICATION_VERIFIER_FLAGS: 0 FAULTING_LOCAL_VARIABLE_NAME: table APP: ruby.exe PRIMARY_PROBLEM_CLASS: NULL_CLASS_PTR_READ BUGCHECK_STR: APPLICATION_FAULT_NULL_CLASS_PTR_READ LAST_CONTROL_TRANSFER: from 67499c00 to 674a6b1d STACK_TEXT: 0041ef3c 67499c00 00000006 00000099 0041ef50 msvcr120_ruby230!st_lookup+0xd 0041ef58 67499baf 02978298 00000099 00000000 msvcr120_ruby230!lookup_method_table+0x20 0041ef6c 6748aaf7 02978298 00000099 0041ef84 msvcr120_ruby230!search_method+0x2f 0041ef90 6748a8a2 02978298 00000099 0041efd8 msvcr120_ruby230!rb_method_entry_get_without_cache+0x17 0041efb4 6749d318 02978298 00000099 0041efd8 msvcr120_ruby230!rb_method_entry+0xa2 0041efe4 674883a2 00620c08 02978298 029782ac msvcr120_ruby230!check_funcall_respond_to+0x18 0041f00c 674bad1e 029782ac 00000c41 00000000 msvcr120_ruby230!rb_check_funcall+0x32 0041f04c 674b827d 029782ac 676493cc 676493c4 msvcr120_ruby230!convert_type+0x9e 0041f068 674531f8 029782ac 00000005 676493cc msvcr120_ruby230!rb_convert_type+0x2d 0041f080 67453232 029782ac 029782ac 0041f34c msvcr120_ruby230!rb_str_to_str+0x18 0041f090 675a8335 0041f324 00000000 00000001 msvcr120_ruby230!rb_string_value+0x32 0041f34c 67490549 02978360 0296b69c 0041f424 msvcr120_ruby230!pack_pack+0x535 0041f35c 67491042 675a7e00 02978360 00000001 msvcr120_ruby230!call_cfunc_1+0x19 0041f424 674912bc 00620c08 001effd0 02a19a88 msvcr120_ruby230!vm_call_cfunc_with_frame+0x2b2 0041f438 67491592 00620c08 001effd0 02a19a88 msvcr120_ruby230!vm_call_cfunc+0x4c 0041f4dc 6748dc94 00620c08 001effd0 02a19a88 msvcr120_ruby230!vm_call_method+0xa2 0041f4f0 674953dc 00620c08 001effd0 02a19a88 msvcr120_ruby230!vm_call_general+0x14 0041fd10 6749b7a8 00620c08 00000000 02a18e98 msvcr120_ruby230!vm_exec_core+0x286c 0041fe04 6748aeb7 00620c08 67438553 00620d54 msvcr120_ruby230!vm_exec+0x98 0041fe1c 6743857e 0066bc8c 4300ee9d 00000000 msvcr120_ruby230!rb_iseq_eval_main+0x27 0041fec0 67437378 0066bc8c 0041fedc 67436b50 msvcr120_ruby230!ruby_exec_internal+0x10e 0041fecc 67436b50 0066bc8c 4341105d 0041feec msvcr120_ruby230!ruby_exec_node+0x18 0041fedc 0117103b 0066bc8c 00645558 0041ff2c msvcr120_ruby230!ruby_run_node+0x30 0041feec 01171261 00000002 00644e00 00645558 ruby!main+0x3b 0041ff2c 75b6337a 7efde000 0041ff78 774692e2 ruby!__tmainCRTStartup+0xfd 0041ff38 774692e2 7efde000 595f9671 00000000 kernel32!BaseThreadInitThunk+0xe 0041ff78 774692b5 011712c9 7efde000 00000000 ntdll!__RtlUserThreadStart+0x70 0041ff90 00000000 011712c9 7efde000 00000000 ntdll!_RtlUserThreadStart+0x1b FAULTING_SOURCE_LINE: t:\projects\bugs\ruby_debug_x32\st.c FAULTING_SOURCE_FILE: t:\projects\bugs\ruby_debug_x32\st.c FAULTING_SOURCE_LINE_NUMBER: 388 FAULTING_SOURCE_CODE: 384: { 385: st_index_t hash_val; 386: register st_table_entry *ptr; 387: > 388: hash_val = do_hash(key, table); 389: 390: if (table->entries_packed) { 391: st_index_t i = find_packed_index(table, hash_val, key); 392: if (i < table->real_entries) { 393: if (value != 0) *value = PVAL(table, i); SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: msvcr120_ruby230!st_lookup+d FOLLOWUP_NAME: MachineOwner MODULE_NAME: msvcr120_ruby230 IMAGE_NAME: msvcr120-ruby230.dll DEBUG_FLR_IMAGE_TIMESTAMP: 5554e802 STACK_COMMAND: ~0s ; kb FAILURE_BUCKET_ID: NULL_CLASS_PTR_READ_c0000005_msvcr120-ruby230.dll!st_lookup BUCKET_ID: APPLICATION_FAULT_NULL_CLASS_PTR_READ_DETOURED_msvcr120_ruby230!st_lookup+d WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/ruby_exe/2_3_0_0/5554e802/msvcr120- ruby230_dll/2_3_0_0/5554e802/c0000005/00076b1d.htm?Retriage=1 Followup: MachineOwner --------- 0:000> r eax=00000099 ebx=00000000 ecx=00000006 edx=0041ef50 esi=00000001 edi=00000000 eip=674a6b1d esp=0041ef2c ebp=0041ef3c iopl=0 nv up ei pl nz na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206 msvcr120_ruby230!st_lookup+0xd: 674a6b1d 8b11 mov edx,dword ptr [ecx] ds:002b:00000006=???????? ``` ### TIMELINE * 2015-06-08 - Initial Discovery * 2015-06-30 - Vendor Notification * 2016-06-14 - Public Disclosure id SSV:96757 last seen 2017-11-19 modified 2017-10-20 published 2017-10-20 reporter Root source https://www.seebug.org/vuldb/ssvid-96757 title Ruby pack_pack Use After Free Vulnerability(CVE-2016-2338)
Talos
id TALOS-2016-0033 last seen 2018-08-31 published 2016-06-14 reporter Talos Intelligence source http://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0033 title Ruby pack_pack Use After Free Vulnerability id TALOS-2016-0032 last seen 2018-08-31 published 2016-06-14 reporter Talos Intelligence source http://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0032 title Ruby Psych::Emitter start_document Heap Overflow Vulnerability
References
- http://www.talosintelligence.com/reports/TALOS-2016-0032/
- http://www.talosintelligence.com/reports/TALOS-2016-0032/
- https://lists.debian.org/debian-lts-announce/2020/03/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00032.html
- https://security.netapp.com/advisory/ntap-20221228-0005/
- https://security.netapp.com/advisory/ntap-20221228-0005/