CVE-2020-35909 – multihash
Package
Manager: cargo
Name: multihash
Vulnerable Version: >=0 <0.11.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00575 pctl0.67796
Details
Unexpected panic in multihash In versions prior 0.11.3 it's possible to make from_slice panic by feeding it certain malformed input. It's never documented that from_slice (and from_bytes which wraps it) can panic, and its' return type (Result<Self, DecodeError>) suggests otherwise. In practice, from_slice/from_bytes is frequently used in networking code and is being called with unsanitized data from untrusted sources. This can allow attackers to cause DoS by causing an unexpected panic in the network client's code..
Metadata
Created: 2021-08-25T20:49:41Z
Modified: 2023-06-13T20:05:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-h7qh-3h6f-w79p/GHSA-h7qh-3h6f-w79p.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-h7qh-3h6f-w79p
Finding: F184
Auto approve: 1