
Cloud Vulnerability DB
A community-led vulnerabilities database
An overflow vulnerability was discovered in the prost-types crate versions before 0.8.0 for Rust, identified as CVE-2021-38192. The vulnerability was reported on July 8, 2021, and affects the conversion functionality from Timestamp to SystemTime. This issue specifically impacts the prost-types crate, which is a part of the Rust ecosystem (RustSec Advisory).
The vulnerability exists in the conversion implementation from prost_types::Timestamp to SystemTime. When processing untrusted input during this conversion, an overflow condition can occur, leading to a panic in the application. The issue affects versions 0.7.0 and earlier of the prost-types crate. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
The primary impact of this vulnerability is a potential denial of service condition. When exploited, the overflow can cause the application to panic, disrupting its normal operation. This affects the availability of systems using the vulnerable versions of the prost-types crate (RustSec Advisory).
The vulnerability has been patched in prost-types version 0.8.0 and later. Users are recommended to upgrade to version 0.8.0 or newer. Additionally, it is advised to switch from using From for SystemTime to TryFrom for SystemTime in the code. This change in implementation helps prevent the overflow condition (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."