GHSA-H7QH-3H6F-W79P
Vulnerability from github – Published: 2021-08-25 20:49 – Updated: 2023-06-13 20:05
VLAI?
Summary
Unexpected panic in multihash
Details
In versions prior 0.11.3 it's possible to make from_slice panic by feeding it certain malformed input. It's never documented that from_slice (and from_bytes which wraps it) can panic, and its' return type (Result) suggests otherwise. In practice, from_slice/from_bytes is frequently used in networking code and is being called with unsanitized data from untrusted sources. This can allow attackers to cause DoS by causing an unexpected panic in the network client's code..
Severity ?
7.5 (High)
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "multihash"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.11.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2020-35909"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"github_reviewed_at": "2021-08-19T20:51:29Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "In versions prior 0.11.3 it\u0027s possible to make from_slice panic by feeding it certain malformed input. It\u0027s never documented that from_slice (and from_bytes which wraps it) can panic, and its\u0027 return type (Result\u003cSelf, DecodeError\u003e) suggests otherwise. In practice, from_slice/from_bytes is frequently used in networking code and is being called with unsanitized data from untrusted sources. This can allow attackers to cause DoS by causing an unexpected panic in the network client\u0027s code..",
"id": "GHSA-h7qh-3h6f-w79p",
"modified": "2023-06-13T20:05:17Z",
"published": "2021-08-25T20:49:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35909"
},
{
"type": "WEB",
"url": "https://github.com/multiformats/rust-multihash/pull/72"
},
{
"type": "PACKAGE",
"url": "https://github.com/multiformats/rust-multihash"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0068.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Unexpected panic in multihash"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…