Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5873-6fwq-463f

Опубликовано: 25 окт. 2023
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

stellar-strkey vulnerable to panic in SignedPayload::from_payload

Impact

Panic vulnerability when a specially crafted payload is used. This is because of the following calculation:

inner_payload_len + (4 - inner_payload_len % 4) % 4

If inner_payload_len is 0xffffffff, (4 - inner_payload_len % 4) % 4 = 1 so

inner_payload_len + (4 - inner_payload_len % 4) % 4 = u32::MAX + 1

which overflow.

Patches

Check that inner_payload_len is not above 64 which should never be the case. Patched in version 0.0.8

Workarounds

Sanitize input payload before it is passed to the vulnerable function so that bytes in payload[32..32+4] and parsed as a u32 is not above 64.

References

GitHub issue #58

Пакеты

Наименование

stellar-strkey

rust
Затронутые версииВерсия исправления

< 0.0.8

0.0.8

EPSS

Процентиль: 38%
0.00168
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-248

Связанные уязвимости

CVSS3: 5.3
nvd
больше 2 лет назад

rs-stellar-strkey is a Rust lib for encode/decode of Stellar Strkeys. A panic vulnerability occurs when a specially crafted payload is used.`inner_payload_len` should not above 64. This vulnerability has been patched in version 0.0.8.

EPSS

Процентиль: 38%
0.00168
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-248