Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html | Mailing List Third Party Advisory |
http://www.debian.org/security/2014/dsa-2887 | Third Party Advisory |
http://www.debian.org/security/2014/dsa-2888 | Third Party Advisory |
https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ | Broken Link Exploit |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2013-10-17 00:55
Updated : 2023-05-19 16:52
NVD link : CVE-2013-4389
Mitre link : CVE-2013-4389
CVE.ORG link : CVE-2013-4389
JSON object : View
Products Affected
opensuse
- opensuse
debian
- debian_linux
rubyonrails
- rails
CWE
CWE-134
Use of Externally-Controlled Format String