
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-36432 is a vulnerability discovered in the alg_ds crate through version 2020-08-25 for Rust programming language. The vulnerability was reported on August 25, 2020, and involves a critical issue where uninitialized memory is dropped during the Matrix::new() operation (RustSec Advisory).
The vulnerability occurs in the Matrix::new() function, which internally calls Matrix::fill_with(). The implementation uses a *ptr = value pattern to initialize the buffer, incorrectly assuming there is an initialized struct at the address. This assumption leads to dropping of uninitialized memory structures. The vulnerability has been assigned a CVSS v3.1 score of 9.8 (CRITICAL) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (RustSec Advisory).
The vulnerability has been rated as Critical with high impacts on confidentiality, integrity, and availability. The CVSS score of 9.8 indicates severe potential consequences, with the vulnerability being exploitable over the network with low attack complexity and requiring no privileges or user interaction (RustSec Advisory).
As of the vulnerability disclosure, no patched versions have been released for this vulnerability (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."