Description
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
Remediation
References
Related Vulnerabilities
Beego Framework Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2024-40465)
Mailman Other Vulnerability (CVE-2002-0855)
Oracle Database Server CVE-2015-4921 Vulnerability (CVE-2015-4921)
Oracle Application Server Credentials Management Errors Vulnerability (CVE-2002-2345)
WordPress Plugin UnGallery 'search' Parameter Remote Arbitrary Command Execution (2.1.5)