CVE-2026-25727: CWE-121: Stack-based Buffer Overflow in time-rs time
CVE-2026-25727 is a medium-severity stack-based buffer overflow vulnerability in the Rust 'time' crate versions 0. 3. 6 to before 0. 3. 47. It occurs when parsing user input formatted according to RFC 2822, specifically exploiting deprecated and rarely-used features to cause stack exhaustion and denial of service. Normal inputs do not trigger this issue. The vulnerability requires low privileges and user interaction but has a high attack complexity. The issue was fixed in version 0. 3.
AI Analysis
Technical Summary
CVE-2026-25727 is a stack-based buffer overflow vulnerability classified under CWE-121 affecting the Rust 'time' crate, versions from 0.3.6 up to but not including 0.3.47. The vulnerability arises during parsing of user-supplied input formatted according to the RFC 2822 date/time standard. Specifically, the flaw exploits deprecated and rarely-used features of RFC 2822 that cause excessive recursion leading to stack exhaustion, effectively resulting in a denial of service (DoS). The vulnerability does not affect normal, well-formed inputs, limiting its exposure to crafted malicious inputs. The attack complexity is high due to the need to craft inputs that trigger deep recursion, and it requires user interaction and low privileges, with no authentication needed. The vulnerability was addressed in version 0.3.47 by implementing a recursion depth limit that causes the parser to return an error instead of exhausting the stack. The CVSS 4.0 base score is 6.8, reflecting medium severity, with network attack vector, high attack complexity, no privileges required, and user interaction necessary. No known exploits have been reported in the wild as of the publication date. This vulnerability primarily impacts applications and services that rely on the 'time' crate for date/time parsing, particularly those that accept or process RFC 2822 formatted inputs, such as email clients, servers, or other communication tools written in Rust.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for denial of service attacks that could disrupt services relying on the Rust 'time' crate for parsing RFC 2822 date/time inputs. This could affect email processing systems, logging services, or any application that parses such date formats. The denial of service could lead to temporary outages, degraded service availability, or resource exhaustion, impacting business continuity and potentially causing reputational damage. Since the vulnerability requires user interaction and crafted inputs, exposure is somewhat limited but still significant for internet-facing services or those processing untrusted inputs. Organizations in sectors with high reliance on Rust-based software, such as technology firms, financial services, and critical infrastructure providers, may face increased risk. The medium severity score indicates that while the vulnerability is not trivial to exploit, successful exploitation could have meaningful operational impacts.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade the 'time' crate to version 0.3.47 or later, where the recursion depth limit has been implemented to prevent stack exhaustion. Additionally, organizations should audit their codebases and dependencies to identify any usage of the affected versions of the 'time' crate, especially in components that parse RFC 2822 date/time inputs. Input validation and sanitization should be enhanced to detect and reject malformed or suspicious date strings that could trigger the vulnerability. Implementing runtime monitoring to detect abnormal stack usage or application crashes related to date parsing can provide early warning signs of exploitation attempts. For critical systems, consider applying application-layer firewalls or input filtering to block malformed inputs before they reach vulnerable components. Finally, maintain awareness of updates from the Rust community and CVE databases for any emerging exploits or patches.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland
CVE-2026-25727: CWE-121: Stack-based Buffer Overflow in time-rs time
Description
CVE-2026-25727 is a medium-severity stack-based buffer overflow vulnerability in the Rust 'time' crate versions 0. 3. 6 to before 0. 3. 47. It occurs when parsing user input formatted according to RFC 2822, specifically exploiting deprecated and rarely-used features to cause stack exhaustion and denial of service. Normal inputs do not trigger this issue. The vulnerability requires low privileges and user interaction but has a high attack complexity. The issue was fixed in version 0. 3.
AI-Powered Analysis
Technical Analysis
CVE-2026-25727 is a stack-based buffer overflow vulnerability classified under CWE-121 affecting the Rust 'time' crate, versions from 0.3.6 up to but not including 0.3.47. The vulnerability arises during parsing of user-supplied input formatted according to the RFC 2822 date/time standard. Specifically, the flaw exploits deprecated and rarely-used features of RFC 2822 that cause excessive recursion leading to stack exhaustion, effectively resulting in a denial of service (DoS). The vulnerability does not affect normal, well-formed inputs, limiting its exposure to crafted malicious inputs. The attack complexity is high due to the need to craft inputs that trigger deep recursion, and it requires user interaction and low privileges, with no authentication needed. The vulnerability was addressed in version 0.3.47 by implementing a recursion depth limit that causes the parser to return an error instead of exhausting the stack. The CVSS 4.0 base score is 6.8, reflecting medium severity, with network attack vector, high attack complexity, no privileges required, and user interaction necessary. No known exploits have been reported in the wild as of the publication date. This vulnerability primarily impacts applications and services that rely on the 'time' crate for date/time parsing, particularly those that accept or process RFC 2822 formatted inputs, such as email clients, servers, or other communication tools written in Rust.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for denial of service attacks that could disrupt services relying on the Rust 'time' crate for parsing RFC 2822 date/time inputs. This could affect email processing systems, logging services, or any application that parses such date formats. The denial of service could lead to temporary outages, degraded service availability, or resource exhaustion, impacting business continuity and potentially causing reputational damage. Since the vulnerability requires user interaction and crafted inputs, exposure is somewhat limited but still significant for internet-facing services or those processing untrusted inputs. Organizations in sectors with high reliance on Rust-based software, such as technology firms, financial services, and critical infrastructure providers, may face increased risk. The medium severity score indicates that while the vulnerability is not trivial to exploit, successful exploitation could have meaningful operational impacts.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade the 'time' crate to version 0.3.47 or later, where the recursion depth limit has been implemented to prevent stack exhaustion. Additionally, organizations should audit their codebases and dependencies to identify any usage of the affected versions of the 'time' crate, especially in components that parse RFC 2822 date/time inputs. Input validation and sanitization should be enhanced to detect and reject malformed or suspicious date strings that could trigger the vulnerability. Implementing runtime monitoring to detect abnormal stack usage or application crashes related to date parsing can provide early warning signs of exploitation attempts. For critical systems, consider applying application-layer firewalls or input filtering to block malformed inputs before they reach vulnerable components. Finally, maintain awareness of updates from the Rust community and CVE databases for any emerging exploits or patches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T16:48:00.426Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69864142f9fa50a62f2a749a
Added to database: 2/6/2026, 7:30:10 PM
Last enriched: 2/6/2026, 7:45:10 PM
Last updated: 2/6/2026, 8:40:03 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25731: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in kovidgoyal calibre
HighCVE-2026-25636: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
HighCVE-2026-25635: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
HighCVE-2026-2065: Missing Authentication in Flycatcher Toys smART Pixelator
MediumCVE-2026-25640: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in pydantic pydantic-ai
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.