René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

129 lines
4.0 KiB
JSON

{
"id": "CVE-2021-43620",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-11-15T05:15:07.913",
"lastModified": "2021-11-18T04:27:13.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the fruity crate through 0.2.0 for Rust. Security-relevant validation of filename extensions is plausibly affected. Methods of NSString for conversion to a string may return a partial result. Because they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first '\\0' byte, which might not be the end of the string."
},
{
"lang": "es",
"value": "Se ha detectado un problema en el crate fruity versiones hasta 0.2.0, para Rust. Una comprobaci\u00f3n relevante para la seguridad de las extensiones de los nombres de archivos est\u00e1 plausiblemente afectada. Los m\u00e9todos de NSString para la conversi\u00f3n a una cadena pueden devolver un resultado parcial. Debido a que llaman a CStr::from_ptr en un puntero al buffer de la cadena, la cadena se termina en el primer byte \"\\0\", que podr\u00eda no ser el final de la cadena"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fruity_project:fruity:0.1.0:*:*:*:*:rust:*:*",
"matchCriteriaId": "0D1DEC41-5B75-4E16-B849-F4FCA67CD85D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fruity_project:fruity:0.2.0:*:*:*:*:rust:*:*",
"matchCriteriaId": "3CE1B1A4-8B5B-4B05-AF74-F170D4C1E0EB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nvzqz/fruity/issues/14",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/rustsec/advisory-db/pull/1102",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0123.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}