CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
15.5%
Rustls is a modern TLS library written in Rust. rustls::ConnectionCommon::complete_io
could fall into an infinite loop based on network input. When using a blocking rustls server, if a client send a close_notify
message immediately after client_hello
, the server’s complete_io
will get in an infinite loop. This vulnerability is fixed in 0.23.5, 0.22.4, and 0.21.11.
[
{
"vendor": "rustls",
"product": "rustls",
"versions": [
{
"version": ">= 0.23.0, < 0.23.5",
"status": "affected"
},
{
"version": ">= 0.22.0, < 0.22.4",
"status": "affected"
},
{
"version": ">= 0.21.0, < 0.21.11",
"status": "affected"
},
{
"version": "= 0.20.0",
"status": "affected"
}
]
}
]