CVE-2018-10191

CRITICAL

mruby <1.4.0 - Use After Free

Title source: llm
STIX 2.1

Description

In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code.

References (3)

Core 3
Core References
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/mruby/mruby/issues/3995
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html

Scores

CVSS v3 9.8
EPSS 0.0129
EPSS Percentile 79.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-190
Status published
Products (2)
debian/debian_linux 9.0
mruby/mruby < 1.4.0
Published Apr 17, 2018
Tracked Since Feb 18, 2026