Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-42444
HistorySep 19, 2023 - 2:47 p.m.

CVE-2023-42444 phonenumber panics on parsing crafted RF3966 inputs

2023-09-1914:47:22
CWE-1284
CWE-392
CWE-248
GitHub_M
www.cve.org
cve-2023-42444
phonenumber panic
parsing
crafted rf3966
fix
v0.3.3+8.13.9
v0.2.5+8.11.3

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

20.2%

phonenumber is a library for parsing, formatting and validating international phone numbers. Prior to versions 0.3.3+8.13.9 and 0.2.5+8.11.3, the phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string. In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string .;phone-context=. Versions 0.3.3+8.13.9 and 0.2.5+8.11.3 contain a patch for this issue. There are no known workarounds.

CNA Affected

[
  {
    "vendor": "whisperfish",
    "product": "rust-phonenumber",
    "versions": [
      {
        "version": "< 0.2.5+8.11.3",
        "status": "affected"
      },
      {
        "version": ">= 0.3.0, < 0.3.3+8.3.19",
        "status": "affected"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

20.2%

Related for CVELIST:CVE-2023-42444