CVE-2017-16516

Related Vulnerabilities: CVE-2017-16516  

In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.

The MITRE CVE dictionary describes this issue as:

In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.

Find out more about CVE-2017-16516 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 7.5
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact High

Affected Packages State

Platform Package State
Red Hat Virtualization 4 rubygem-yajl-ruby Will not fix
Red Hat OpenStack Platform Operational Tools 9 rubygem-yajl-ruby Will not fix
Red Hat OpenStack Platform 13.0 Operational Tools for RHEL 7 rubygem-yajl-ruby Will not fix
Red Hat OpenStack Platform 12.0 Operational Tools for RHEL 7 rubygem-yajl-ruby Will not fix
Red Hat OpenStack Platform 11.0 Operational Tools for RHEL 7 rubygem-yajl-ruby Will not fix
Red Hat OpenStack Platform 10.0 Operational Tools for RHEL 7 rubygem-yajl-ruby Will not fix
Red Hat OpenShift Enterprise 3 rubygem-yajl-ruby Will not fix
Red Hat Enterprise Linux OpenStack Platform 8.0 Operational Tools for RHEL 7 rubygem-yajl-ruby Will not fix
Red Hat Enterprise Linux OpenStack Platform 7.0 Operational Tools for RHEL 7 rubygem-yajl-ruby Will not fix