National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2018-3759 Detail

Description

private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.

Source:  MITRE
Description Last Modified:  06/13/2018

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147

Technical Details

Vulnerability Type (View All)

Quick Info

CVE Dictionary Entry:
CVE-2018-3759
NVD Published Date:
06/13/2018
NVD Last Modified:
06/13/2018