Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-32714

Опубликовано: 07 июл. 2021
Источник: debian
EPSS Низкий

Описание

hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in "request smuggling" or "desync attacks." The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rust-hyperfixed0.14.19-1package

Примечания

  • https://rustsec.org/advisories/RUSTSEC-2021-0079.html

  • https://github.com/hyperium/hyper/security/advisories/GHSA-5h46-h7hh-c6x9

EPSS

Процентиль: 60%
0.00399
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 4 лет назад

hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in "request smuggling" or "desync attacks." The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.

CVSS3: 5.9
nvd
больше 4 лет назад

hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in "request smuggling" or "desync attacks." The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.

CVSS3: 9.1
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.9
github
больше 4 лет назад

Integer Overflow in Chunked Transfer-Encoding

CVSS3: 9.1
fstec
больше 4 лет назад

Уязвимость HTTP-библиотеки для Rust Hyper, связанная с целочисленным переполнением, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании

EPSS

Процентиль: 60%
0.00399
Низкий