Integer Overflow to Buffer Overflow in Rust Standard Library Affects Multiple Versions
CVE-2018-1000810

9.8CRITICAL

Key Information:

Vendor
Rust-lang
Status
Vendor
CVE Published:
8 October 2018

Summary

The Rust Programming Language Standard Library versions 1.29.0, 1.28.0, and earlier versions contain a vulnerability where an integer overflow can lead to a buffer overflow. This issue can be triggered through calls to the str::repeat function with a large argument, which may overflow an internal buffer. This vulnerability has been addressed in version 1.29.1, mitigating the risk posed by this flaw.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.