In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Heap-based Buffer Overflow vulnerabilities in an interactive lesson.
Start learningUpgrade openssl to version 0.10.79 or higher.
openssl is a bindings for the Rust programming language.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the CipherCtxRef::cipher_update, CipherCtxRef::cipher_update_vec, and symm::Crypter::update functions when encrypting with AES key-wrap-with-padding ciphers. An attacker can cause heap corruption and potentially execute arbitrary code or crash the application by providing specially crafted input that results in output buffers being incorrectly sized.