CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial
Rustls is a modern TLS library written in Rust. rustls::ConnectionCommon::complete_io
could fall into an infinite loop based on network input. When using a blocking rustls server, if a client send a close_notify
message immediately after client_hello
, the server’s complete_io
will get in an infinite loop. This vulnerability is fixed in 0.23.5, 0.22.4, and 0.21.11.
[
{
"cpes": [
"cpe:2.3:a:rustls_project:rustls:*:*:*:*:*:*:*:*"
],
"vendor": "rustls_project",
"product": "rustls",
"versions": [
{
"status": "unknown",
"version": "0.21.11"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial