- Reported
-
- Issued
-
- Package
-
phonenumber
(crates.io)
- Type
-
Vulnerability
- Categories
-
- Keywords
-
#panic
#untrusted-input
#parsing
- Aliases
-
- References
-
- CVSS Score
- 8.6
HIGH
- CVSS Details
-
- Attack vector
- Network
- Attack complexity
- Low
- Privileges required
- None
- User interaction
- None
- Scope
- Changed
- Confidentiality
- None
- Integrity
- None
- Availability
- High
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Patched
-
- Unaffected
-
- Affected Functions
- Version
phonenumber::parse
-
Description
Impact
The phonenumber parsing code may panic due to a reachable assert!
guard on the phonenumber string.
In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber, e.g. over the network, specifically strings of the form +dwPAA;phone-context=AA
, where the "number" part potentially parses as a number larger than 2^56.
Since f69abee1/0.3.4/#52.
0.2.x series is not affected.
Patches
Patches have been published as version 0.3.6+8.13.36
.
Advisory available under CC0-1.0
license.