Skip to content

Commit 1886fa5

Browse files
authored
Added CVE-2016-2336 for ruby (#980)
1 parent db8a791 commit 1886fa5

File tree

1 file changed

+38
-0
lines changed

1 file changed

+38
-0
lines changed

rubies/ruby/CVE-2016-2336.yml

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
engine: ruby
3+
cve: 2016-2336
4+
ghsa: f46g-7w88-2qv4
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2016-2336
6+
title: Type confusion exists in ole_invoke and ole_query_interface
7+
methods of Ruby's WIN32OLE class
8+
date: 2017-01-06
9+
description: |
10+
Type confusion exists in two methods of Ruby's
11+
WIN32OLE class, ole_invoke and ole_query_interface.
12+
Attacker passing different type of object than this assumed
13+
by developers can cause arbitrary code execution.
14+
cvss_v2: 7.5
15+
cvss_v3: 9.8
16+
unaffected_versions:
17+
- "< 2.2.2"
18+
patched_versions:
19+
- ">= 2.3.1"
20+
related:
21+
url:
22+
- https://nvd.nist.gov/vuln/detail/CVE-2016-2336
23+
- https://github.com/ruby/ruby/blob/v2_3_1/ChangeLog
24+
- https://github.com/ruby/ruby/commit/a9721a259665149b1b9ff0beabcf5f8dc0136120
25+
- https://github.com/ruby/ruby/commit/d40ea2afa6ff5a6e5befcf342fb7b6dc58796b20
26+
- https://security.snyk.io/vuln/SNYK-UNMANAGED-RUBY-2370206?utm_source=copilot.com
27+
- https://osv.dev/vulnerability/CVE-2016-2336
28+
- https://github.com/google/osv.dev/issues/2333
29+
- http://www.talosintelligence.com/reports/TALOS-2016-0029
30+
- https://app.opencve.io/cve/CVE-2016-2336
31+
- https://ubuntu.com/security/CVE-2016-2336
32+
- https://github.com/advisories/GHSA-f46g-7w88-2qv4
33+
notes: |
34+
- osv.dev reference has a lot of discussion of CVE's fix.
35+
- The 2 commits are mentioned in osv.dev reference.
36+
- Appears that ruby-lang project lost data in move from svn to github.
37+
- Talo reference says: TESTED VERSIONS are "Ruby 2.3.0 dev Ruby 2.2.2"
38+
- 1st win32ole gem release was 12/3/2020: https://rubygems.org/gems/win32ole

0 commit comments

Comments
 (0)