Improper Handling of Length Parameter Inconsistency Affecting pgp package, versions <0.14.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-PGP-8491026
  • published6 Dec 2024
  • disclosed6 Dec 2024
  • creditinvd

Introduced: 6 Dec 2024

CVE-2024-53856  (opens in a new tab)
CWE-130  (opens in a new tab)

How to fix?

Upgrade pgp to version 0.14.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Handling of Length Parameter Inconsistency via the processing of crafted data. An attacker can cause the application to crash by providing malformed input.

Note: According to the reporter, this can happen in the following scenarios:

  1. Parsing OpenPGP messages from binary or armor format
  2. Decrypting OpenPGP messages via decrypt_with_password()
  3. Parsing or converting public keys
  4. Parsing signed cleartext messages from armor format
  5. Using malformed private keys to sign or encrypt

References

CVSS Scores

version 4.0
version 3.1