An issue was discovered in the ws crate through 2020-09-25 for Rust. The outgoing buffer is not properly limited, leading to a remote memory-consumption attack.
References
Link | Resource |
---|---|
https://rustsec.org/advisories/RUSTSEC-2020-0043.html | Third Party Advisory |
https://rustsec.org/advisories/RUSTSEC-2020-0043.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://rustsec.org/advisories/RUSTSEC-2020-0043.html - Third Party Advisory |
01 Nov 2022, 14:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ws-rs_project:ws-rs:*:*:*:*:*:rust:*:* | |
CWE | CWE-770 |
Information
Published : 2020-12-31 10:15
Updated : 2024-11-21 05:28
NVD link : CVE-2020-35896
Mitre link : CVE-2020-35896
CVE.ORG link : CVE-2020-35896
JSON object : View
Products Affected
ws-rs_project
- ws-rs
CWE
CWE-770
Allocation of Resources Without Limits or Throttling