CVE-2021-27378Incorrect Calculation of Buffer Size in Core Project Rand Core

Severity
9.8CRITICALNVD
EPSS
0.5%
top 35.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18
Latest updateAug 25

Description

An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages8 packages

🔴Vulnerability Details

4
GHSA
Incorrect check on buffer length in rand_core2021-08-25
OSV
Incorrect check on buffer length in rand_core2021-08-25
OSV
CVE-2021-27378: An issue was discovered in the rand_core crate before 02021-02-18
OSV
Incorrect check on buffer length when seeding RNGs2021-02-12

📋Vendor Advisories

2
Microsoft
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks a random number generator may be seeded with too li2021-02-09
Debian
CVE-2021-27378: rust-rand-core - An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because re...2021
CVE-2021-27378 — Incorrect Calculation of Buffer Size | cvebase