rustsec-2020-0002
Vulnerability from osv_rustsec
Published
2020-01-16 12:00
Modified
2023-06-13 13:10
Summary
Parsing a specially crafted message can result in a stack overflow
Details
Affected versions of this crate contained a bug in which decoding untrusted input could overflow the stack.
On architectures with stack probes (like x86), this can be used for denial of service attacks, while on architectures without stack probes (like ARM) overflowing the stack is unsound and can result in potential memory corruption (or even RCE).
The flaw was quickly corrected by @danburkert and released in version 0.6.1.
{
"affected": [
{
"database_specific": {
"categories": [
"denial-of-service",
"memory-corruption"
],
"cvss": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "prost",
"purl": "pkg:cargo/prost"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0-0"
},
{
"fixed": "0.6.1"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2020-35858",
"GHSA-gv73-9mwv-fwgq"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "Affected versions of this crate contained a bug in which decoding untrusted\ninput could overflow the stack.\n\nOn architectures with stack probes (like x86), this can be used for denial of\nservice attacks, while on architectures without stack probes (like ARM)\noverflowing the stack is unsound and can result in potential memory corruption\n(or even RCE).\n \nThe flaw was quickly corrected by @danburkert and released in version 0.6.1.",
"id": "RUSTSEC-2020-0002",
"modified": "2023-06-13T13:10:24Z",
"published": "2020-01-16T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/prost"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0002.html"
},
{
"type": "REPORT",
"url": "https://github.com/danburkert/prost/issues/267"
}
],
"related": [],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Parsing a specially crafted message can result in a stack overflow"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…