Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-32714
HistoryJul 07, 2021 - 12:00 a.m.

CVE-2021-32714

2021-07-0700:00:00
ubuntu.com
ubuntu.com
11

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

45.3%

hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper’s
HTTP server and client code had a flaw that could trigger an integer
overflow when decoding chunk sizes that are too big. This allows possible
data loss, or if combined with an upstream HTTP proxy that allows chunk
sizes larger than hyper does, can result in “request smuggling” or “desync
attacks.” The vulnerability is patched in version 0.14.10. Two possible
workarounds exist. One may reject requests manually that contain a
Transfer-Encoding header or ensure any upstream proxy rejects
Transfer-Encoding chunk sizes greater than what fits in 64-bit unsigned
integers.

OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchrust-hyper< anyUNKNOWN

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

45.3%