Headline
GHSA-whhr-7f2w-qqj2: phonenumber panics on parsing crafted RF3966 inputs
Impact
The phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string.
In a typical deployment of rust-phonenumber
, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string .;phone-context=
.
Patches
Patches will be published as version 0.3.3+8.13.9
and backported as 0.2.5+8.11.3
.
Workarounds
n.a.
References
n.a.
Package
cargo phonenumber (Rust)
Affected versions
< 0.2.5
>= 0.3.0, < 0.3.3
Patched versions
0.2.5
0.3.3
Description
Impact
The phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string.
In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string .;phone-context=.
Patches
Patches will be published as version 0.3.3+8.13.9 and backported as 0.2.5+8.11.3.
Workarounds
n.a.
References
n.a.
References
- GHSA-whhr-7f2w-qqj2
- https://nvd.nist.gov/vuln/detail/CVE-2023-42444
- whisperfish/rust-phonenumber@2dd44be
- whisperfish/rust-phonenumber@bea8e73
rubdos published to whisperfish/rust-phonenumber
Sep 19, 2023
Published to the GitHub Advisory Database
Sep 21, 2023
Reviewed
Sep 21, 2023
Last updated
Sep 21, 2023
Related news
phonenumber is a library for parsing, formatting and validating international phone numbers. Prior to versions `0.3.3+8.13.9` and `0.2.5+8.11.3`, the phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string. In a typical deployment of `rust-phonenumber`, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string `.;phone-context=`. Versions `0.3.3+8.13.9` and `0.2.5+8.11.3` contain a patch for this issue. There are no known workarounds.