CVE-2020-35858 – prost
Package
Manager: cargo
Name: prost
Vulnerable Version: >=0 <0.6.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.02484 pctl0.84723
Details
Out of bounds write in prost Affected versions of this crate contained a bug in which decoding untrusted input could overflow the stack. On architectures with stack probes (like x86), this can be used for denial of service attacks, while on architectures without stack probes (like ARM) overflowing the stack is unsound and can result in potential memory corruption (or even RCE).
Metadata
Created: 2021-08-25T20:46:11Z
Modified: 2023-06-13T20:33:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-gv73-9mwv-fwgq/GHSA-gv73-9mwv-fwgq.json
CWE IDs: ["CWE-787"]
Alternative ID: GHSA-gv73-9mwv-fwgq
Finding: F111
Auto approve: 1