CVE-2018-14337

HIGH

mruby 1.4.1 - Memory Corruption

Title source: llm
STIX 2.1

Description

The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.

References (2)

Core 2
Core References
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/mruby/mruby/issues/4062
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html

Scores

CVSS v3 7.5
EPSS 0.0036
EPSS Percentile 58.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-190
Status published
Products (2)
debian/debian_linux 9.0
mruby/mruby 1.4.1
Published Jul 17, 2018
Tracked Since Feb 18, 2026