
Cloud Vulnerability DB
A community-led vulnerabilities database
A panic vulnerability was discovered in the hpack-rs Rust crate's Decoder struct, identified as RUSTSEC-2023-0085. The vulnerability stems from insufficient buffer length validation when parsing integers in the updatemaxdynamic_size function after encountering a SizeUpdate field. This vulnerability affects users who decode untrusted input using the Decoder (GitHub Issue).
The vulnerability exists in the Decoder struct's updatemaxdynamic_size function, which fails to validate buffer length before parsing integers. The issue occurs specifically when processing a SizeUpdate field, where the code assumes the buffer contains enough data without proper validation. A proof of concept can be triggered with just a single byte input: [0x3f] (GitHub Issue).
When exploited, this vulnerability causes a panic in applications using the hpack-rs crate to decode HPACK-encoded data. This could lead to denial of service conditions in applications processing untrusted HTTP/2 headers (GitHub Issue).
A patched version of the crate has been made available on crates.io under the name 'hpack-patched'. Users can mitigate the vulnerability by updating their dependencies to use this patched version. The fix involves properly handling the return value from decodeinteger and implementing proper error handling in the updatemaxdynamicsize function (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."