GHSA-GV73-9MWV-FWGQ
Vulnerability from github – Published: 2021-08-25 20:46 – Updated: 2023-06-13 20:33
VLAI?
Summary
Out of bounds write in prost
Details
Affected versions of this crate contained a bug in which decoding untrusted input could overflow the stack. On architectures with stack probes (like x86), this can be used for denial of service attacks, while on architectures without stack probes (like ARM) overflowing the stack is unsound and can result in potential memory corruption (or even RCE).
Severity ?
9.8 (Critical)
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "prost"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.6.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2020-35858"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": true,
"github_reviewed_at": "2021-08-19T21:20:08Z",
"nvd_published_at": null,
"severity": "CRITICAL"
},
"details": "Affected versions of this crate contained a bug in which decoding untrusted input could overflow the stack. On architectures with stack probes (like x86), this can be used for denial of service attacks, while on architectures without stack probes (like ARM) overflowing the stack is unsound and can result in potential memory corruption (or even RCE).",
"id": "GHSA-gv73-9mwv-fwgq",
"modified": "2023-06-13T20:33:10Z",
"published": "2021-08-25T20:46:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35858"
},
{
"type": "WEB",
"url": "https://github.com/danburkert/prost/issues/267"
},
{
"type": "WEB",
"url": "https://github.com/danburkert/prost/commit/04091d3e745c27590a5f1b7f581793e4159486b5"
},
{
"type": "PACKAGE",
"url": "https://github.com/danburkert/prost"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2020-0002.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Out of bounds write in prost"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…