Uninitialized Memory Exposure Affecting claxon package, versions <0.3.2>=0.4.0 <0.4.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-CLAXON-72294
  • published4 Oct 2018
  • disclosed23 Aug 2018
  • creditRuud van Asseldonk

Introduced: 23 Aug 2018

CVE-2018-20992  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade claxon to versions 0.3.2, 0.4.1 or higher.

Overview

claxon is a FLAC decoding library in Rust.

Affected versions of this package are vulnerable to Uninitialized Memory Exposure due to invalid assumption about the decode buffer.

Affected versions of Claxon made an invalid assumption about the decode buffer size being a multiple of a value read from the bitstream. This could cause parts of the decode buffer to not be overwritten. If the decode buffer was newly allocated and uninitialized, this uninitialized memory could be exposed. An attacker could observe parts of the uninitialized memory in the decoded audio stream.

CVSS Scores

version 3.1