ID CVE-2020-25792
Summary An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair().
References
Vulnerable Configurations
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.1.0:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.1.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.1.1:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.1.1:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.1.2:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.1.2:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.1.3:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.1.3:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.2.0:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.2.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.2.1:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.2.1:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.2.2:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.2.2:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.3.0:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.3.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.3.1:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.3.1:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.3.2:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.3.2:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.4.0:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.4.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.5.0:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.5.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.5.1:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.5.1:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.5.2:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.5.2:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.5.3:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.5.3:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.6.0:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.6.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.6.1:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.6.1:*:*:*:*:rust:*:*
  • cpe:2.3:a:sized-chunks_project:sized-chunks:0.6.2:*:*:*:*:rust:*:*
    cpe:2.3:a:sized-chunks_project:sized-chunks:0.6.2:*:*:*:*:rust:*:*
CVSS
Base: 5.0 (as of 12-01-2021 - 13:44)
Impact:
Exploitability:
CWE CWE-129
CAPEC
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
misc
Last major update 12-01-2021 - 13:44
Published 19-09-2020 - 21:15
Last modified 12-01-2021 - 13:44
Back to Top