CVE-2021-29922

library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:01

Type Values Removed Values Added
References () https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis - Third Party Advisory () https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis - Third Party Advisory
References () https://doc.rust-lang.org/beta/std/net/struct.Ipv4Addr.html - Vendor Advisory () https://doc.rust-lang.org/beta/std/net/struct.Ipv4Addr.html - Vendor Advisory
References () https://github.com/rust-lang/rust/issues/83648 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/rust-lang/rust/issues/83648 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://github.com/rust-lang/rust/pull/83652 - Patch, Third Party Advisory () https://github.com/rust-lang/rust/pull/83652 - Patch, Third Party Advisory
References () https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md - Exploit, Third Party Advisory () https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md - Exploit, Third Party Advisory
References () https://security.gentoo.org/glsa/202210-09 - Third Party Advisory () https://security.gentoo.org/glsa/202210-09 - Third Party Advisory

07 Nov 2022, 16:36

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202210-09 - (GENTOO) https://security.gentoo.org/glsa/202210-09 - Third Party Advisory

16 Oct 2022, 17:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202210-09 -

17 Aug 2021, 18:23

Type Values Removed Values Added
CPE cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
References (MISC) https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md - (MISC) https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md - Exploit, Third Party Advisory
References (MISC) https://github.com/rust-lang/rust/issues/83648 - (MISC) https://github.com/rust-lang/rust/issues/83648 - Exploit, Issue Tracking, Patch, Third Party Advisory
References (MISC) https://doc.rust-lang.org/beta/std/net/struct.Ipv4Addr.html - (MISC) https://doc.rust-lang.org/beta/std/net/struct.Ipv4Addr.html - Vendor Advisory
References (MISC) https://github.com/rust-lang/rust/pull/83652 - (MISC) https://github.com/rust-lang/rust/pull/83652 - Patch, Third Party Advisory
References (MISC) https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis - (MISC) https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.4
v3 : 9.1

07 Aug 2021, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-07 17:15

Updated : 2024-11-21 06:01


NVD link : CVE-2021-29922

Mitre link : CVE-2021-29922

CVE.ORG link : CVE-2021-29922


JSON object : View

Products Affected

rust-lang

  • rust