Headline
CVE-2023-42444: panic on parsing crafted RF3966 phonenumber inputs
phonenumber is a library for parsing, formatting and validating international phone numbers. Prior to versions 0.3.3+8.13.9
and 0.2.5+8.11.3
, the phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string. In a typical deployment of rust-phonenumber
, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string .;phone-context=
. Versions 0.3.3+8.13.9
and 0.2.5+8.11.3
contain a patch for this issue. There are no known workarounds.
High
rubdos published GHSA-whhr-7f2w-qqj2
Sep 19, 2023
Package
cargo phonenumber (Rust)
Patched versions
0.3.3,0.2.5
Description
Impact
The phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string.
In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string .;phone-context=.
Patches
Patches will be published as version 0.3.3+8.13.9 and backported as 0.2.5+8.11.3.
Workarounds
n.a.
References
n.a.
Severity
CVSS base metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Weaknesses
Credits
Related news
### Impact The phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string. In a typical deployment of `rust-phonenumber`, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string `.;phone-context=`. ### Patches Patches will be published as version `0.3.3+8.13.9` and backported as `0.2.5+8.11.3`. ### Workarounds n.a. ### References n.a.