9.8
CVSSv3

CVE-2018-1000810

Published: 08/10/2018 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Rust Programming Language Standard Library version 1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1, 126.0 contains a CWE-680: Integer Overflow to Buffer Overflow vulnerability in standard library that can result in buffer overflow. This attack appear to be exploitable via str::repeat, passed a large number, can overflow an internal buffer. This vulnerability appears to have been fixed in 1.29.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rust-lang rust 1.27.0

rust-lang rust 1.26.2

rust-lang rust 1.26.1

rust-lang rust 1.26.0

rust-lang rust 1.27.1

rust-lang rust 1.27.2

rust-lang rust 1.28.0

rust-lang rust 1.29.0

Github Repositories

Publications Public Conferences BlueHatIL 2022 - Security Analysis of MTE Through Examples: slides, video, repo Blackhat USA 2021 - Security Analysis of CHERI ISA: slides, video Blackhat USA 2020 - Breaking VSM by Attacking SecureKernel: slides, video 35C3 - Modern Windows Userspace Exploitation: slides, video, repo Recon BRX 2018 - Linux Vulnerabilities Windows Exploits: slide