
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the csv-sniffer crate through 2021-01-05 for Rust, where the preamble_skipcount function may read from uninitialized memory locations. The vulnerability was reported on January 5, 2021, and affects versions prior to 0.2.0 of the csv-sniffer crate (RustSec Advisory, NVD).
The vulnerability stems from the preamble_skipcount function passing an uninitialized buffer to a user-provided Read implementation. This implementation can read from the uninitialized buffer, leading to memory exposure. Additionally, it can return an incorrect number of bytes written to the buffer. The severity of this vulnerability is rated as CRITICAL with a CVSS v3.1 Base Score of 9.8 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior, potentially leading to memory exposure and system instability. The vulnerability allows arbitrary Read implementations to access uninitialized memory regions, which could result in information disclosure or system crashes (RustSec Advisory).
The vulnerability has been patched in version 0.2.0 of the csv-sniffer crate. Users are advised to upgrade to this version or later to address the security issue (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."