An issue was discovered in the ws crate through 2020-09-25 for Rust. The outgoing buffer is not properly limited, leading to a remote memory-consumption attack.
References
Link | Resource |
---|---|
https://rustsec.org/advisories/RUSTSEC-2020-0043.html | Third Party Advisory |
Configurations
History
01 Nov 2022, 14:08
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-770 | |
First Time |
Ws-rs Project
Ws-rs Project ws-rs |
|
CPE | cpe:2.3:a:ws-rs_project:ws-rs:*:*:*:*:*:rust:*:* |
07 Jan 2021, 13:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ws-rs:ws-rs:*:*:*:*:*:rust:*:* | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CWE | CWE-400 | |
References | (MISC) https://rustsec.org/advisories/RUSTSEC-2020-0043.html - Third Party Advisory |
31 Dec 2020, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2020-12-31 10:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-35896
Mitre link : CVE-2020-35896
CVE.ORG link : CVE-2020-35896
JSON object : View
Products Affected
ws-rs_project
- ws-rs
CWE
CWE-770
Allocation of Resources Without Limits or Throttling