Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-42444
HistorySep 19, 2023 - 2:47 p.m.

CVE-2023-42444 phonenumber panics on parsing crafted RF3966 inputs

2023-09-1914:47:22
CWE-248
CWE-1284
CWE-392
GitHub_M
github.com
cve-2023-42444
phonenumber
library
vulnerability
out-of-bounds
rf3966
inputs
patch

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

38.8%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

phonenumber is a library for parsing, formatting and validating international phone numbers. Prior to versions 0.3.3+8.13.9 and 0.2.5+8.11.3, the phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string. In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string .;phone-context=. Versions 0.3.3+8.13.9 and 0.2.5+8.11.3 contain a patch for this issue. There are no known workarounds.

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

38.8%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-42444