CVE-2018-1000810
Gentoo Linux Security Advisory 201812-11
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Rust Programming Language Standard Library version 1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1, 126.0 contains a CWE-680: Integer Overflow to Buffer Overflow vulnerability in standard library that can result in buffer overflow. This attack appear to be exploitable via str::repeat, passed a large number, can overflow an internal buffer. This vulnerability appears to have been fixed in 1.29.1.
Rust Programming Language Standard Library en versiones 1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1 y 126.0 contiene una vulnerabilidad CWE-680: desbordamiento de enteros a desbordamiento de búfer en la biblioteca estándar que puede resultar en un desbordamiento de búfer. El ataque parece ser explotable mediante str::repeat (al pasar un número grande, puede desbordar un búfer interno). La vulnerabilidad parece haber sido solucionada en la versión 1.29.1.
Multiple vulnerabilities have been found in Rust, the worst which may allow local attackers to execute arbitrary code. Versions less than 1.29.1 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-09-21 CVE Reserved
- 2018-10-08 CVE Published
- 2024-08-05 CVE Updated
- 2025-04-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://groups.google.com/forum/#%21topic/rustlang-security-announcements/CmSuTm-SaU0 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://blog.rust-lang.org/2018/09/21/Security-advisory-for-std.html | 2023-11-07 | |
https://security.gentoo.org/glsa/201812-11 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rust-lang Search vendor "Rust-lang" | Rust Search vendor "Rust-lang" for product "Rust" | 1.26.0 Search vendor "Rust-lang" for product "Rust" and version "1.26.0" | - |
Affected
| ||||||
Rust-lang Search vendor "Rust-lang" | Rust Search vendor "Rust-lang" for product "Rust" | 1.26.1 Search vendor "Rust-lang" for product "Rust" and version "1.26.1" | - |
Affected
| ||||||
Rust-lang Search vendor "Rust-lang" | Rust Search vendor "Rust-lang" for product "Rust" | 1.26.2 Search vendor "Rust-lang" for product "Rust" and version "1.26.2" | - |
Affected
| ||||||
Rust-lang Search vendor "Rust-lang" | Rust Search vendor "Rust-lang" for product "Rust" | 1.27.0 Search vendor "Rust-lang" for product "Rust" and version "1.27.0" | - |
Affected
| ||||||
Rust-lang Search vendor "Rust-lang" | Rust Search vendor "Rust-lang" for product "Rust" | 1.27.1 Search vendor "Rust-lang" for product "Rust" and version "1.27.1" | - |
Affected
| ||||||
Rust-lang Search vendor "Rust-lang" | Rust Search vendor "Rust-lang" for product "Rust" | 1.27.2 Search vendor "Rust-lang" for product "Rust" and version "1.27.2" | - |
Affected
| ||||||
Rust-lang Search vendor "Rust-lang" | Rust Search vendor "Rust-lang" for product "Rust" | 1.28.0 Search vendor "Rust-lang" for product "Rust" and version "1.28.0" | - |
Affected
| ||||||
Rust-lang Search vendor "Rust-lang" | Rust Search vendor "Rust-lang" for product "Rust" | 1.29.0 Search vendor "Rust-lang" for product "Rust" and version "1.29.0" | - |
Affected
|