Vulnerability CVE-2018-1000810


Published: 2018-10-08

Description:
The Rust Programming Language Standard Library version 1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1, 126.0 contains a CWE-680: Integer Overflow to Buffer Overflow vulnerability in standard library that can result in buffer overflow. This attack appear to be exploitable via str::repeat, passed a large number, can overflow an internal buffer. This vulnerability appears to have been fixed in 1.29.1.

Type:

CWE-190

(Integer Overflow or Wraparound)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Rust-lang -> RUST 

 References:
https://blog.rust-lang.org/2018/09/21/Security-advisory-for-std.html
https://groups.google.com/forum/#!topic/rustlang-security-announcements/CmSuTm-SaU0
https://security.gentoo.org/glsa/201812-11

Copyright 2024, cxsecurity.com

 

Back to Top