CVE-2021-29922

library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:01

Type Values Removed Values Added
References () https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis - Third Party Advisory () https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis - Third Party Advisory
References () https://doc.rust-lang.org/beta/std/net/struct.Ipv4Addr.html - Vendor Advisory () https://doc.rust-lang.org/beta/std/net/struct.Ipv4Addr.html - Vendor Advisory
References () https://github.com/rust-lang/rust/issues/83648 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/rust-lang/rust/issues/83648 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://github.com/rust-lang/rust/pull/83652 - Patch, Third Party Advisory () https://github.com/rust-lang/rust/pull/83652 - Patch, Third Party Advisory
References () https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md - Exploit, Third Party Advisory () https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md - Exploit, Third Party Advisory
References () https://security.gentoo.org/glsa/202210-09 - Third Party Advisory () https://security.gentoo.org/glsa/202210-09 - Third Party Advisory

Information

Published : 2021-08-07 17:15

Updated : 2024-11-21 06:01


NVD link : CVE-2021-29922

Mitre link : CVE-2021-29922

CVE.ORG link : CVE-2021-29922


JSON object : View

Products Affected

rust-lang

  • rust