Vulnerabilites related to rpgp - rpgp
CVE-2024-53856 (GCVE-0-2024-53856)
Vulnerability from cvelistv5
Published
2024-12-05 15:24
Modified
2024-12-09 20:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows an attacker to trigger rpgp crashes by providing crafted data. This vulnerability is fixed in 0.14.1.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-53856", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-09T20:22:29.915489Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-09T20:23:09.592Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "rpgp", "vendor": "rpgp", "versions": [ { "status": "affected", "version": "\u003c 0.14.1" } ] } ], "descriptions": [ { "lang": "en", "value": "rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows an attacker to trigger rpgp crashes by providing crafted data. This vulnerability is fixed in 0.14.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130: Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-148", "description": "CWE-148: Improper Neutralization of Input Leaders", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-617", "description": "CWE-617: Reachable Assertion", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T15:24:36.049Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/rpgp/rpgp/security/advisories/GHSA-9rmp-2568-59rv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rpgp/rpgp/security/advisories/GHSA-9rmp-2568-59rv" } ], "source": { "advisory": "GHSA-9rmp-2568-59rv", "discovery": "UNKNOWN" }, "title": "rPGP Panics on Malformed Untrusted Input" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-53856", "datePublished": "2024-12-05T15:24:36.049Z", "dateReserved": "2024-11-22T17:30:02.142Z", "dateUpdated": "2024-12-09T20:23:09.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-53857 (GCVE-0-2024-53857)
Vulnerability from cvelistv5
Published
2024-12-05 15:22
Modified
2024-12-05 16:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows attackers to trigger resource exhaustion vulnerabilities in rpgp by providing crafted messages. This affects general message parsing and decryption with symmetric keys.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:rpgp:rpgp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rpgp", "vendor": "rpgp", "versions": [ { "lessThan": "0.14.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-53857", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T16:32:52.619501Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T16:34:13.917Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "rpgp", "vendor": "rpgp", "versions": [ { "status": "affected", "version": "\u003c 0.14.1" } ] } ], "descriptions": [ { "lang": "en", "value": "rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows attackers to trigger resource exhaustion vulnerabilities in rpgp by providing crafted messages. This affects general message parsing and decryption with symmetric keys." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T15:22:09.049Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/rpgp/rpgp/security/advisories/GHSA-4grw-m28r-q285", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rpgp/rpgp/security/advisories/GHSA-4grw-m28r-q285" } ], "source": { "advisory": "GHSA-4grw-m28r-q285", "discovery": "UNKNOWN" }, "title": "rPGP Potential Resource Exhaustion when handling Untrusted Messages" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-53857", "datePublished": "2024-12-05T15:22:09.049Z", "dateReserved": "2024-11-22T17:30:02.142Z", "dateUpdated": "2024-12-05T16:34:13.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }