Lucene search

K
osvGoogleOSV:RUSTSEC-2017-0004
HistoryMay 03, 2017 - 12:00 p.m.

Integer overflow leads to heap-based buffer overflow in encode_config_buf

2017-05-0312:00:00
Google
osv.dev
8

0.002 Low

EPSS

Percentile

61.1%

Affected versions of this crate suffered from an integer overflow bug when
calculating the size of a buffer to use when encoding base64 using the
encode_config_buf and encode_config functions. If the input string
was large, this would cause a buffer to be allocated that was too small.
Since this function writes to the buffer using unsafe code, it would
allow an attacker to write beyond the buffer, causing memory corruption
and possibly the execution of arbitrary code.

This flaw was corrected by using checked arithmetic to calculate
the size of the buffer.

CPENameOperatorVersion
base64lt0.5.2

0.002 Low

EPSS

Percentile

61.1%