
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-53160 affects the sequoia-openpgp crate, a Rust library, in versions before 1.16.0. The vulnerability was discovered in 2023 and allows out-of-bounds array access that leads to a panic condition. The issue affects multiple versions of the software: versions before 1.1.1, versions 1.2.0 to 1.8.1, and versions 1.9.0 to 1.16.0 (GitHub Advisory, NVD).
The vulnerability is classified as an Out-of-bounds Read (CWE-125) issue. It has received varying CVSS scores, with NVD assigning a base score of 5.3 (Medium) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, while MITRE assigned a score of 2.9 (Low) with vector CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L. The vulnerability occurs when attacker-controlled input results in the use of an out-of-bound array index, causing Rust to detect the invalid access and trigger a panic (RUSTSEC Advisory).
The primary impact of this vulnerability is a potential denial-of-service condition. When exploited, the vulnerability causes the application to panic. However, it's important to note that attackers cannot read from or write to the application's address space, limiting the potential damage to service disruption (GitHub Advisory, Sequoia PGP).
The vulnerability has been patched in multiple versions: 1.1.1, 1.8.1, and 1.16.0. Users are recommended to upgrade to these patched versions to address the vulnerability. The fixes include patches for various parsing errors and improvements in handling array access (Sequoia PGP).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."