You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 21, 2022. It is now read-only.
ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.
CVE-2018-1000201 - High Severity Vulnerability
Ruby FFI library
path: /var/lib/gems/2.3.0/cache/ffi-1.9.10.gem
Library home page: https://rubygems.org/downloads/ffi-1.9.10.gem
Dependency Hierarchy:
ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.
Publish Date: 2018-06-22
URL: CVE-2018-1000201
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Type: Change files
Origin: ffi/ffi@09e0c60
Release Date: 2018-06-01
Fix Resolution: Replace or update the following file: library.rb
Step up your Open Source Security Game with WhiteSource here