Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5gmm-6m36-r7jh

Опубликовано: 05 апр. 2024
Источник: github
Github: Прошло ревью
CVSS3: 4.5

Описание

transpose: Buffer overflow due to integer overflow

Given the function transpose::transpose:

fn transpose<T: Copy>(input: &[T], output: &mut [T], input_width: usize, input_height: usize)

The safety check input_width * input_height == output.len() can fail due to input_width * input_height overflowing in such a way that it equals output.len(). As a result of failing the safety check, memory past the end of output is written to. This only occurs in release mode since * panics on overflow in debug mode.

Exploiting this issue requires the caller to pass input_width and input_height arguments such that multiplying them overflows, and the overflown result equals the lengths of input and output slices.

Пакеты

Наименование

transpose

rust
Затронутые версииВерсия исправления

>= 0.1.0, < 0.2.3

0.2.3

EPSS

Процентиль: 9%
0.00032
Низкий

4.5 Medium

CVSS3

Дефекты

CWE-120
CWE-190

Связанные уязвимости

CVSS3: 4.5
ubuntu
7 месяцев назад

The transpose crate before 0.2.3 for Rust allows an integer overflow via input_width and input_height arguments.

CVSS3: 4.5
nvd
7 месяцев назад

The transpose crate before 0.2.3 for Rust allows an integer overflow via input_width and input_height arguments.

CVSS3: 4.5
debian
7 месяцев назад

The transpose crate before 0.2.3 for Rust allows an integer overflow v ...

EPSS

Процентиль: 9%
0.00032
Низкий

4.5 Medium

CVSS3

Дефекты

CWE-120
CWE-190