Miggo Logo

CVE-2021-26951:
Out of bounds write in calamine

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.65141%
Published
8/25/2021
Updated
2/3/2023
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
calaminerust< 0.17.00.17.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description and GitHub issue #199 explicitly reference Sectors::get as the demonstration point. The code shown in the issue uses unsafe Vec::set_len to expand the vector length without ensuring adequate capacity, followed by a Read operation into the uninitialized buffer. This matches the CWE-787 (OOB write) and memory exposure patterns described in the advisory. The combination of set_len misuse and uninitialized memory access in a security-critical path makes this function clearly vulnerable with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in t** **l*min* *r*t* ***or* *.**.* *or Rust. It *llows *tt**k*rs to ov*rwrit* ***p-m*mory lo**tions ****us* V**::s*t_l*n is us** wit*out prop*r m*mory *l*imin*, *n* t*is uniniti*liz** m*mory is us** *or * us*r-provi*** R*** o

Reasoning

T** vuln*r**ility **s*ription *n* *it*u* issu* #*** *xpli*itly r***r*n** S**tors::**t *s t** **monstr*tion point. T** *o** s*own in t** issu* us*s uns*** V**::s*t_l*n to *xp*n* t** v**tor l*n*t* wit*out *nsurin* ***qu*t* **p**ity, *ollow** *y * R***