Integer Overflow to Buffer Overflow in Rust Standard Library Affects Multiple Versions
CVE-2018-1000810
9.8CRITICAL
Summary
The Rust Programming Language Standard Library versions 1.29.0, 1.28.0, and earlier versions contain a vulnerability where an integer overflow can lead to a buffer overflow. This issue can be triggered through calls to the str::repeat function with a large argument, which may overflow an internal buffer. This vulnerability has been addressed in version 1.29.1, mitigating the risk posed by this flaw.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved