Vulnerability DatabaseRUSTSEC-2024-0377

RUSTSEC-2024-0377
Rust vulnerability analysis and mitigation

Overview

A heap buffer overflow vulnerability was discovered in the dbn program, specifically in the c_chars_to_str function. The vulnerability was reported on October 7, 2024, and affects the dbn CLI tool when processing certain DBN files. The issue was fixed in version 0.22.1 released on October 8, 2024 (DBN Issue).

Technical details

The vulnerability occurs in the c_chars_to_str function when handling string conversions. The heap-buffer-overflow is triggered in the strlen() function because CStr::from_ptr() expects a null-terminated C string, but there was no guarantee that the input chars array was properly null-terminated. If the array didn't contain a null byte (\0), strlen() would read past the buffer's boundaries in search of a null terminator, leading to an out-of-bounds memory read (DBN Issue).

Impact

When exploited, this vulnerability could cause the dbn tool to crash due to heap-buffer-overflow when processing certain DBN files. The issue was particularly evident when using specific flag combinations (e.g., -C, -C -s, -J, -T -s) with malformed input files (DBN Issue).

Mitigation and workarounds

The issue was resolved by adding proper bounds checking to ensure the chars array contains a valid null-terminated string. The fix includes checking for a null-terminator in the array before converting it to a string, and returning an error if no null-terminator is found. The patch was implemented in commit 339efb9 and released in version 0.22.1 (DBN Issue).

Community reactions

The vulnerability was promptly acknowledged by the maintainers, who confirmed the issue and implemented a fix within 24 hours of the report. The community response was positive, with the reporter and maintainers collaborating effectively to address the security concern (DBN Issue).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22257HIGH8.8
  • RustRust
  • salvo
NoYesJan 08, 2026
CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
GHSA-g59m-gf8j-gjf5LOW3.7
  • RustRust
  • aws-sdk-eventbridge
NoYesJan 08, 2026
GHSA-585q-cm62-757jLOW2
  • RustRust
  • mnl
NoNoJan 09, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management