CVE-2021-27378 — Incorrect Calculation of Buffer Size in Core Project Rand Core
Severity
9.8CRITICALNVD
EPSS
0.5%
top 35.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 18
Latest updateAug 25
Description
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages8 packages
🔴Vulnerability Details
4📋Vendor Advisories
2Microsoft▶
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks a random number generator may be seeded with too li↗2021-02-09
Debian▶
CVE-2021-27378: rust-rand-core - An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because re...↗2021