Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-35922
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Memory allocation based on untrusted length in rust-websocket
Source: NVD (National Vulnerability Database)
Vulnerability Description
Rust-WebSocket is a WebSocket (RFC6455) library written in Rust. In versions prior to 0.26.5 untrusted websocket connections can cause an out-of-memory (OOM) process abort in a client or a server. The root cause of the issue is during dataframe parsing. Affected versions would allocate a buffer based on the declared dataframe size, which may come from an untrusted source. When `Vec::with_capacity` fails to allocate, the default Rust allocator will abort the current process, killing all threads. This affects only sync (non-Tokio) implementation. Async version also does not limit memory, but does not use `with_capacity`, so DoS can happen only when bytes for oversized dataframe or message actually got delivered by the attacker. The crashes are fixed in version 0.26.5 by imposing default dataframe size limits. Affected users are advised to update to this version. Users unable to upgrade are advised to filter websocket traffic externally or to only accept trusted traffic.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Rust-WebSocket 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Rust-WebSocket是基于Rust的WebSocket库。 Rust-WebSocket 0.26.5之前版本存在资源管理错误漏洞,该漏洞源于不受信任的websocket连接可能会导致客户端或服务器中的内存不足(OOM)进程中止,问题的根本原因是在数据帧解析期间,受影响的版本将根据声明的数据帧大小分配缓冲区,该大小可能来自不受信任的来源,当“Vec::with_capacity”分配失败时,默认的Rust分配器将中止当前进程,杀死所有线程。这仅影响同步(non-Tokio)实现,异步版本也不限制内
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
websockets-rsrust-websocket < 0.26.5 -
II. Public POCs for CVE-2022-35922
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-35922
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-35922

No comments yet


Leave a comment