We found results for “”
WS-2022-0085
Good to know:
Date: November 3, 2024
Versions before 2.0.2 of the crate 'enum-map' did not properly check the length of an enum when using enum_map! macro, trusting user-provided length. Fixed in version 2.0.2. When the LENGTH in the Enum trait does not match the array length in the EnumArray trait, this can result in the initialization of the enum map with uninitialized types, which in turn can allow an attacker to execute arbitrary code. This problem can only occur with a manual implementation of the Enum trait, it will never occur for enums that use #[derive(Enum)].
Language: RUST
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
OS Command Injections
CWE-78Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | LOW |
Availability (A): | NONE |