Lucene search

K
githubGitHub Advisory DatabaseGHSA-WHHR-7F2W-QQJ2
HistorySep 21, 2023 - 5:10 p.m.

phonenumber panics on parsing crafted RFC3966 inputs

2023-09-2117:10:57
CWE-248
CWE-392
CWE-1284
GitHub Advisory Database
github.com
12
phonenumber
parsing
vulnerability
rfc3966
crafted inputs
panic
out-of-bounds access
rust-phonenumber
network
patch
version 0.3.3+8.13.9
backport
version 0.2.5+8.11.3

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

20.2%

Impact

The phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string.

In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string .;phone-context=.

Patches

Patches will be published as version 0.3.3+8.13.9 and backported as 0.2.5+8.11.3.

Workarounds

n.a.

References

n.a.

Affected configurations

Vulners
Node
whisperfishphonenumberRange<0.3.3
OR
whisperfishphonenumberRange<0.2.5
CPENameOperatorVersion
phonenumberlt0.3.3
phonenumberlt0.2.5

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

20.2%

Related for GHSA-WHHR-7F2W-QQJ2