When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
solicit 0.4.4
This project contains known security vulnerabilities. Find detailed information at the bottom.
solicit
(3 total, 2 outdated, 1 insecure, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
hpack ⚠️ | ^0.2 | 0.3.0 | insecure |
log | ^0.3 | 0.4.21 | out of date |
openssl ⚠️ | * | 0.10.64 | maybe insecure |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
hpack
: HPACK decoder panics on invalid inputDue to insufficient checking of input data, decoding certain data sequences can lead to Decoder::decode panicking rather than returning an error.
Example code that triggers this vulnerability looks like this:
use hpack::Decoder;
pub fn main() {
let input = &[0x3f];
let mut decoder = Decoder::new();
let _ = decoder.decode(input);
}
hpack is unmaintained. A crate with the panics fixed has been published as hpack-patched.
Also consider using fluke-hpack or httlib-huffman as an alternative.