CVE-2008-2725

N/A Unknown
Published: June 24, 2008 Modified: April 23, 2026
View on NVD

Description

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://secunia.com/advisories/30802
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/30831
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/30867
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/30875
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/30894
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/31062
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/31090
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/31181
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/31256
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/31687
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/33178
Source: secalert@redhat.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200812-17.xml
Source: secalert@redhat.com
Third Party Advisory
http://support.apple.com/kb/HT2163
Source: secalert@redhat.com
Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206
Source: secalert@redhat.com
Broken Link
http://www.debian.org/security/2008/dsa-1612
Source: secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2008/dsa-1618
Source: secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:140
Source: secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:141
Source: secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:142
Source: secalert@redhat.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0561.html
Source: secalert@redhat.com
Third Party Advisory
http://www.ruby-forum.com/topic/157034
Source: secalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/archive/1/493688/100/0/threaded
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/29903
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020347
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-621-1
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/1907/references
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/1981/references
Source: secalert@redhat.com
Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/ruby1.8/+bug/241657
Source: secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2727
Source: secalert@redhat.com
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/43350
Source: secalert@redhat.com
Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-2626
Source: secalert@redhat.com
Broken Link
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/30802
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/30831
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/30867
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/30875
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/30894
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/31062
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/31090
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/31181
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/31256
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/31687
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/33178
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200812-17.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.429562
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT2163
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://weblog.rubyonrails.org/2008/6/21/multiple-ruby-security-vulnerabilities
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0206
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2008/dsa-1612
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2008/dsa-1618
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:140
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:141
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:142
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.matasano.com/log/1070/updates-on-drew-yaos-terrible-ruby-vulnerabilities/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/archives/fedora-security-commits/2008-June/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0561.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ruby-forum.com/topic/157034
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.rubyinside.com/june-2008-ruby-security-vulnerabilities-927.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/493688/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/29903
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020347
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-621-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2008/1907/references
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2008/1981/references
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.zedshaw.com/rants/the_big_ruby_vulnerabilities.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://bugs.launchpad.net/ubuntu/+source/ruby1.8/+bug/241657
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2727
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/43350
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-2626
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9606
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00937.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

86 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.5%
85th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian canonical ruby-lang