Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory #394

Merged
merged 2 commits into from
Sep 25, 2020

Conversation

gnunicorn
Copy link
Contributor

We've recently been made aware that the memory leak we were seeing in the rpc components in one of our software comes from the ws-crate and can even be exploited to kill the process by forcing it to allocate too much memory.

Unfortunately, despite us attempting to contact the original authors of the crate, and the providing a patch, a fixed version has not been published yet. We have a published a fork with the patch applied however, but the advisory format doesn't quite allow us to specify that. The problem itself has been reported over a year ago on the repository and is included in the latest published version. An attempt to hand over maintainership has not been successful so far and it is unclear when a fix to the original crate will be provided, so we took the hard decision to go public with this vulnerability to not put the community and others building upon it to risk.

"""

[versions]
patched = []
Copy link
Contributor Author

@gnunicorn gnunicorn Sep 25, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As said in the description, we tried to contact the maintainers, but it seems the crate isn't actively maintained, so no fixed version has been published yet. I know this is a mandatory field, so I'd like to know how we want to deal with this.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We could file another advisory marking ws-rs unmaintained and suggesting your fork instead; see e.g. https://rustsec.org/advisories/RUSTSEC-2016-0005.html

@gnunicorn gnunicorn changed the title Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory Sep 25, 2020
@Shnatsel Shnatsel merged commit f63849d into rustsec:master Sep 25, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants