CVE-2019-12083

Summary

The Rust Programming Language Standard Library 1.34.x before 1.34.2 contains a stabilized method which, if overridden, can violate Rust's safety guarantees and cause memory unsafety. If the `Error::type_id` method is overridden then any type can be safely cast to any other type, causing memory safety vulnerabilities in safe code (e.g., out-of-bounds write or read). Code that does not manually implement Error::type_id is unaffected.

Technical Details

CVSSv3 Severity:

High

CVSSv2 Score:

6.8

CVSSv3 Score:

8.1

CWE ID:

CWE-119

Published Date:

Monday 13th of May 2019

Modified Date:

Saturday 25th of May 2019

CVSSv2 Score:
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication Required: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
CVSSv3 Score:
  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Common Platform Enumeration (CPE) Affected: Common Platform Enumeration (CPE) List:

Reference: Find your Vulnerabilities:

Find out if you have vulnerabilities exposing you to hackers and malware: Download Mageni's Free Edition

Keyword Search

Search CVEs, Products and Vendors.

Don't pay for a vulnerability scanning and management platform. This one is free.

Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.