Skip to content

Latest commit

 

History

History
24 lines (19 loc) · 1.07 KB

RUSTSEC-2021-0041.md

File metadata and controls

24 lines (19 loc) · 1.07 KB
[advisory]
id = "RUSTSEC-2021-0041"
aliases = ["CAN-2021-1000007", "CVE-2021-29932", "GHSA-qpgv-g792-wh6x"]
cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
package = "parse_duration"
date = "2021-03-18"
url = "https://github.com/zeta12ti/parse_duration/issues/21"
categories = ["denial-of-service"]
keywords = ["parsing", "untrusted data"]

[versions]
patched = []
unaffected = []

[affected.functions]
"parse_duration::parse" = ["*"]

Denial of service through parsing payloads with too big exponent

The parse_duration::parse function allows for parsing duration strings with exponents like 5e5s where under the hood, the BigInt type along with the pow function are used for such payloads. Passing an arbitrarily big exponent makes the parse_duration::parse function to process the payload for a very long time taking up CPU and memory.

This allows an attacker to cause a DoS if the parse_duration::parse function is used to process untrusted input.