
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (RUSTSEC-2020-0005) was discovered in the cbox crate through version 2020-03-19 for Rust. The issue allows dereferencing raw pointers without requiring unsafe code, which is a significant security concern in Rust's memory safety model (NVD).
The vulnerability is tracked as CVE-2020-35860 and has received a CVSS v3.1 Base Score of 9.8 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue is classified as a NULL Pointer Dereference (CWE-476). The vulnerability allows dereferencing of raw pointers through the CBox API without the normally required unsafe code blocks (NVD).
The vulnerability can lead to segmentation faults and potential arbitrary memory access. A simple proof of concept demonstrates that creating a CBox with a null pointer and attempting to print it results in a segmentation fault, indicating the severity of the issue (Github Issue).
The vulnerability affects versions through 2020-03-19 of the cbox crate. Users should update to a patched version if available or avoid using the affected versions of the crate (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."