Lucene search

K
cve[email protected]CVE-2024-32650
HistoryApr 19, 2024 - 4:15 p.m.

CVE-2024-32650

2024-04-1916:15:10
CWE-835
web.nvd.nist.gov
34
cve-2024-32650
rustls
tls library
infinite loop
vulnerability
complete_io
network input
blocking server
close_notify
fixed
0.23.5
0.22.4
0.21.11
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%

Rustls is a modern TLS library written in Rust. rustls::ConnectionCommon::complete_io could fall into an infinite loop based on network input. When using a blocking rustls server, if a client send a close_notify message immediately after client_hello, the server’s complete_io will get in an infinite loop. This vulnerability is fixed in 0.23.5, 0.22.4, and 0.21.11.

Affected configurations

Vulners
Node
rustlsrustlsRange0.23.00.23.5
OR
rustlsrustlsRange0.22.00.22.4
OR
rustlsrustlsRange0.21.00.21.11
OR
rustlsrustlsMatch0.20.0

CNA Affected

[
  {
    "vendor": "rustls",
    "product": "rustls",
    "versions": [
      {
        "version": ">= 0.23.0, < 0.23.5",
        "status": "affected"
      },
      {
        "version": ">= 0.22.0, < 0.22.4",
        "status": "affected"
      },
      {
        "version": ">= 0.21.0, < 0.21.11",
        "status": "affected"
      },
      {
        "version": "= 0.20.0",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%