Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-32650
HistoryApr 19, 2024 - 4:05 p.m.

CVE-2024-32650 Rustls vulnerable to an infinite loop in rustls::conn::ConnectionCommon::complete_io() with proper client input

2024-04-1916:05:44
CWE-835
GitHub_M
github.com
2
rustls
tls library
infinite loop
vulnerability
fixed versions

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Rustls is a modern TLS library written in Rust. rustls::ConnectionCommon::complete_io could fall into an infinite loop based on network input. When using a blocking rustls server, if a client send a close_notify message immediately after client_hello, the server’s complete_io will get in an infinite loop. This vulnerability is fixed in 0.23.5, 0.22.4, and 0.21.11.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:rustls_project:rustls:*:*:*:*:*:*:*:*"
    ],
    "vendor": "rustls_project",
    "product": "rustls",
    "versions": [
      {
        "status": "unknown",
        "version": "0.21.11"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial