CVE-2021-29922

library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*

History

07 Nov 2022, 16:36

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202210-09 - (GENTOO) https://security.gentoo.org/glsa/202210-09 - Third Party Advisory

16 Oct 2022, 17:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202210-09 -

17 Aug 2021, 18:23

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.4
v3 : 9.1
CPE cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
References (MISC) https://github.com/rust-lang/rust/issues/83648 - (MISC) https://github.com/rust-lang/rust/issues/83648 - Exploit, Issue Tracking, Patch, Third Party Advisory
References (MISC) https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis - (MISC) https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis - Third Party Advisory
References (MISC) https://github.com/rust-lang/rust/pull/83652 - (MISC) https://github.com/rust-lang/rust/pull/83652 - Patch, Third Party Advisory
References (MISC) https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md - (MISC) https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md - Exploit, Third Party Advisory
References (MISC) https://doc.rust-lang.org/beta/std/net/struct.Ipv4Addr.html - (MISC) https://doc.rust-lang.org/beta/std/net/struct.Ipv4Addr.html - Vendor Advisory

07 Aug 2021, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-07 17:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-29922

Mitre link : CVE-2021-29922

CVE.ORG link : CVE-2021-29922


JSON object : View

Products Affected

rust-lang

  • rust