Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
Products
Rustls TLS library
- 0.23.5
- 0.22.4
- 0.21.11
Source
security-advisories@github.com
Tags
CVE-2024-32650 details
Published : April 19, 2024, 4:15 p.m.
Last Modified : April 19, 2024, 4:19 p.m.
Last Modified : April 19, 2024, 4:19 p.m.
Description
Rustls is a modern TLS library written in Rust. `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input. When using a blocking rustls server, if a client send a `close_notify` message immediately after `client_hello`, the server's `complete_io` will get in an infinite loop. This vulnerability is fixed in 0.23.5, 0.22.4, and 0.21.11.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.5 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
7.5
Exploitability Score
Impact Score
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
URL | Source |
---|---|
https://github.com/rustls/rustls/commit/2123576840aa31043a31b0770e6572136fbe0c2d | security-advisories@github.com |
https://github.com/rustls/rustls/commit/6e938bcfe82a9da7a2e1cbf10b928c7eca26426e | security-advisories@github.com |
https://github.com/rustls/rustls/commit/f45664fbded03d833dffd806503d3c8becd1b71e | security-advisories@github.com |
https://github.com/rustls/rustls/security/advisories/GHSA-6g7w-8wpp-frhj | security-advisories@github.com |
This website uses the NVD API, but is not approved or certified by it.