Stack-based Buffer Overflow Affecting whoami package, versions <1.5.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-WHOAMI-6371517
  • published5 Mar 2024
  • disclosed28 Feb 2024
  • creditUnknown

Introduced: 28 Feb 2024

CVE NOT AVAILABLE CWE-121  (opens in a new tab)

How to fix?

Upgrade whoami to version 1.5.0 or higher.

Overview

Affected versions of this package are vulnerable to Stack-based Buffer Overflow via the username function. An attacker can cause denial of service and data corruption, and the issue may also be exploitable for further attacks.

Note: This is only exploitable on illumos and Solaris platforms, as well as any other Unix platforms that are not one of the following: linux, macos, freebsd, dragonfly, bitrig, openbsd, netbsd.

CVSS Scores

version 3.1