logo

CVE-2020-35909 multihash

Package

Manager: cargo
Name: multihash
Vulnerable Version: >=0 <0.11.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00575 pctl0.67796

Details

Unexpected panic in multihash In versions prior 0.11.3 it's possible to make from_slice panic by feeding it certain malformed input. It's never documented that from_slice (and from_bytes which wraps it) can panic, and its' return type (Result<Self, DecodeError>) suggests otherwise. In practice, from_slice/from_bytes is frequently used in networking code and is being called with unsanitized data from untrusted sources. This can allow attackers to cause DoS by causing an unexpected panic in the network client's code..

Metadata

Created: 2021-08-25T20:49:41Z
Modified: 2023-06-13T20:05:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-h7qh-3h6f-w79p/GHSA-h7qh-3h6f-w79p.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-h7qh-3h6f-w79p
Finding: F184
Auto approve: 1