phonenumber is a library for parsing, formatting and validating international phone numbers. Since 0.3.4, the phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string. In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber, e.g. over the network, specifically strings of the form `+dwPAA;phone-context=AA`, where the "number" part potentially parses as a number larger than 2^56. This vulnerability is fixed in 0.3.6.
References
Configurations
No configuration.
History
21 Nov 2024, 09:28
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/whisperfish/rust-phonenumber/commit/b792151b17fc90231c232a23935830c2266f3203 - | |
References | () https://github.com/whisperfish/rust-phonenumber/commit/f69abee1481fac0d6d531407bae90020e39c6407 - | |
References | () https://github.com/whisperfish/rust-phonenumber/issues/69 - | |
References | () https://github.com/whisperfish/rust-phonenumber/pull/52 - | |
References | () https://github.com/whisperfish/rust-phonenumber/security/advisories/GHSA-mjw4-jj88-v687 - |
09 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-09 15:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-39697
Mitre link : CVE-2024-39697
CVE.ORG link : CVE-2024-39697
JSON object : View
Products Affected
No product.