Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Heap-based Buffer Overflow vulnerabilities in an interactive lesson.
Start learningUpgrade toodee to version 0.6.0 or higher.
toodee is an a lightweight and high performance two-dimensional wrapper around a growable Vec.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the DrainCol::drop destructor. An attacker can cause memory corruption or potentially execute arbitrary code by triggering an off-by-one error during the destruction of a column, leading to a memory copy operation that exceeds the bounds of the associated vector.
use toodee::*;
fn main() {
let mut array = TooDee::init(2, 2, 0);
array.remove_col(0);
}