
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-mcrf-7hf9-f6q5) affects the rmpv Rust crate, which was discovered on November 21, 2017, and involves unchecked vector pre-allocation during MessagePack deserialization. The issue affects versions prior to 0.4.2 of the rmpv package and was officially published to the GitHub Advisory Database on August 25, 2021. The vulnerability is classified as having moderate severity (GitHub Advisory, RustSec Advisory).
The vulnerability stems from the crate's behavior during the deserialization of raw buffers, where it pre-allocates memory without performing sufficient checks on data availability. This technical oversight allows for the processing of small MessagePack messages that can trigger allocation of disproportionately large amounts of memory, potentially reaching gigabytes in size. The issue was identified through AFL fuzzing testing, with a proof-of-concept demonstrating execution times of 200ms in release mode and 2 minutes 47 seconds in debug mode (GitHub Issue).
The primary impact of this vulnerability is the potential for denial-of-service (DoS) attacks. Attackers can exploit this vulnerability by crafting small MessagePack messages that cause the application to allocate excessive amounts of memory, potentially exhausting system resources (RustSec Advisory).
The vulnerability has been patched in version 0.4.2 of the rmpv crate. Users are advised to upgrade to this version or later to address the security issue (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."