
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability RUSTSEC-2021-0103 (CVE-2021-45697) was discovered in the molecule crate for Rust versions before 0.7.2. The issue was disclosed on December 26, 2021, and affects the FixVec functionality within the molecule crate. The vulnerability involves an incorrect implementation of the total_size function for partial reading of FixVec lengths (NVD, GitHub Advisory).
The vulnerability stems from an incorrect implementation of the total_size function used for partial reading of FixVec lengths. The issue has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a severe security risk with potential for remote exploitation (NVD).
When using the total_size function to partially read the length of any FixVec, users will receive incorrect results due to the implementation flaw. This could potentially lead to memory-related issues and incorrect data processing in applications utilizing the affected versions of the molecule crate (GitHub Advisory).
The vulnerability has been patched in version 0.7.2 of the molecule crate. For users unable to update immediately, a workaround exists: if you have access to the whole FixVec A, you can use A.asslice().len() to obtain the total size of the FixVec instead of using the vulnerable totalsize function (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."