{
  "threat_severity" : "Low",
  "public_date" : "2017-03-02T00:00:00Z",
  "bugzilla" : {
    "description" : "ruby: Arbitrary heap exposure during a JSON.generate call",
    "id" : "1487552",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.9",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-200",
  "details" : [ "Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.", "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory." ],
  "statement" : "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2018-02-28T00:00:00Z",
    "advisory" : "RHSA-2018:0378",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "ruby-0:2.0.0.648-33.el7_4"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 6",
    "release_date" : "2017-12-19T00:00:00Z",
    "advisory" : "RHSA-2017:3485",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el6",
    "package" : "rh-ruby24-ruby-0:2.4.2-86.el6"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 6",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0583",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el6",
    "package" : "rh-ruby22-ruby-0:2.2.9-19.el6"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 6",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0585",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el6",
    "package" : "rh-ruby23-ruby-0:2.3.6-67.el6"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS",
    "release_date" : "2017-12-19T00:00:00Z",
    "advisory" : "RHSA-2017:3485",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el6",
    "package" : "rh-ruby24-ruby-0:2.4.2-86.el6"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0583",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el6",
    "package" : "rh-ruby22-ruby-0:2.2.9-19.el6"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0585",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el6",
    "package" : "rh-ruby23-ruby-0:2.3.6-67.el6"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7",
    "release_date" : "2017-12-19T00:00:00Z",
    "advisory" : "RHSA-2017:3485",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby24-ruby-0:2.4.2-86.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0583",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby22-ruby-0:2.2.9-19.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0585",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby23-ruby-0:2.3.6-67.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS",
    "release_date" : "2017-12-19T00:00:00Z",
    "advisory" : "RHSA-2017:3485",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby24-ruby-0:2.4.2-86.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0583",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby22-ruby-0:2.2.9-19.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0585",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby23-ruby-0:2.3.6-67.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS",
    "release_date" : "2017-12-19T00:00:00Z",
    "advisory" : "RHSA-2017:3485",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby24-ruby-0:2.4.2-86.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0583",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby22-ruby-0:2.2.9-19.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS",
    "release_date" : "2018-03-26T00:00:00Z",
    "advisory" : "RHSA-2018:0585",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby23-ruby-0:2.3.6-67.el7"
  } ],
  "package_state" : [ {
    "product_name" : "CloudForms Management Engine 5",
    "fix_state" : "Affected",
    "package_name" : "rh-ruby22-ruby",
    "cpe" : "cpe:/a:redhat:cloudforms_managementengine:5"
  }, {
    "product_name" : "CloudForms Management Engine 5",
    "fix_state" : "Affected",
    "package_name" : "ruby-200-ruby",
    "cpe" : "cpe:/a:redhat:cloudforms_managementengine:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Subscription Asset Manager",
    "fix_state" : "Under investigation",
    "package_name" : "ruby193-ruby",
    "cpe" : "cpe:/a:rhel_sam:1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2017-14064\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-14064\nhttps://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/" ],
  "name" : "CVE-2017-14064",
  "csaw" : false
}