Miggo Logo

GHSA-9344-p847-qm5c:
Low severity (DoS) vulnerability in sequoia-openpgp

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
6/26/2024
Updated
6/26/2024
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
sequoia-openpgprust>= 1.13.0, < 1.21.01.21.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly identifies RawCertParser as the vulnerable component and describes an infinite loop condition during certificate parsing. The 'next' method in Rust iterators is typically responsible for advancing through elements. The described vulnerability pattern matches a faulty iterator implementation that doesn't properly consume input bytes when encountering errors, leading to reprocessing the same data. The introduction of a specific error type (cert::raw::Error::UnuspportedCert) in the fix suggests the loop logic was modified to handle this case and advance the stream appropriately.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T**r* is * **ni*l-o*-s*rvi** vuln*r**ility in s*quoi*-op*np*p, our *r*t* provi*in* * low-l*v*l int*r**** to our Op*nP*P impl*m*nt*tion. W**n tri***r**, t** pro**ss will *nt*r *n in*init* loop. M*ny t**nks to *n*r*w **ll****r *or *is*losin* t** issu*

Reasoning

T** **visory *xpli*itly i**nti*i*s `R*w**rtP*rs*r` *s t** vuln*r**l* *ompon*nt *n* **s*ri**s *n in*init* loop *on*ition *urin* **rti*i**t* p*rsin*. T** `'n*xt'` m*t*o* in `Rust` it*r*tors is typi**lly r*sponsi*l* *or **v*n*in* t*rou** *l*m*nts. T** *