Skip to main content

CVE-2020-25792: n/a in n/a

High
VulnerabilityCVE-2020-25792cvecve-2020-25792
Published: Sat Sep 19 2020 (09/19/2020, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair().

AI-Powered Analysis

AILast updated: 07/03/2025, 09:56:42 UTC

Technical Analysis

CVE-2020-25792 is a high-severity vulnerability identified in the sized-chunks crate for the Rust programming language, affecting versions through 0.6.2. The vulnerability arises from improper bounds checking in the implementation of the Chunk data structure, specifically in the pair() constructor method. This method fails to verify the size of the array when constructing a Chunk, leading to a potential out-of-bounds access scenario classified under CWE-129 (Improper Validation of Array Index). The vulnerability has a CVSS 3.1 base score of 7.5, indicating a high severity level. The vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H reveals that the vulnerability is remotely exploitable over the network without requiring privileges or user interaction, and it impacts availability only, with no confidentiality or integrity loss. The lack of array size validation can cause a buffer over-read or buffer overflow, potentially leading to application crashes or denial of service (DoS). No known exploits have been reported in the wild, and no patches or vendor-specific mitigations are listed, suggesting that users of the sized-chunks crate should proactively update or apply fixes if available. Since the affected product is a Rust crate, the vulnerability primarily impacts software projects that incorporate this crate for chunked data processing, which may be used in various applications including network services, data processing pipelines, or embedded systems.

Potential Impact

For European organizations, the primary impact of this vulnerability is the risk of denial of service in applications that depend on the sized-chunks crate. This could disrupt critical services, especially in sectors relying on Rust-based software for performance-sensitive or safety-critical operations such as telecommunications, finance, industrial control systems, or cloud infrastructure providers. Although the vulnerability does not compromise confidentiality or integrity, availability disruptions can lead to operational downtime, financial losses, and reputational damage. Organizations using Rust in their software stacks should assess whether their applications or dependencies include the vulnerable crate version. Given the remote exploitability and lack of required privileges or user interaction, attackers could trigger service outages from external networks, increasing the threat surface. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks, especially as awareness of the vulnerability spreads.

Mitigation Recommendations

European organizations should conduct a thorough inventory of their software dependencies to identify usage of the sized-chunks crate, particularly versions up to 0.6.2. Developers should update to the latest patched version of the crate once available or apply any community-provided patches addressing the array size validation issue. If immediate updates are not feasible, implementing runtime checks or input validation at the application layer to ensure chunk sizes are within expected bounds can mitigate exploitation risks. Additionally, deploying application-layer protections such as rate limiting, anomaly detection, and robust error handling can reduce the impact of potential denial of service attempts. Organizations should also monitor Rust ecosystem advisories and subscribe to vulnerability feeds to stay informed about patches or exploit developments. For critical infrastructure, isolating Rust-based services and employing redundancy can help maintain availability despite potential crashes triggered by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-09-19T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb181

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/3/2025, 9:56:42 AM

Last updated: 8/16/2025, 12:44:50 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats