A vulnerability was discovered in the odoh-rs rust crate that stems from faulty logic during the parsing of encrypted queries. This issue specifically occurs when processing encrypted query data received from remote clients and enables an attacker with knowledge of this vulnerability to craft and send specially designed encrypted queries to targeted ODOH servers running with odoh-rs. Upon successful exploitation, the server will crash abruptly, disrupting its normal operation and rendering the service temporarily unavailable.
References
Link | Resource |
---|---|
https://github.com/cloudflare/odoh-rs/pull/28 | Patch Vendor Advisory |
https://github.com/cloudflare/odoh-rs/security/advisories/GHSA-gpcv-p28p-fv2p | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-08-03 15:15
Updated : 2023-08-10 14:00
NVD link : CVE-2023-3766
Mitre link : CVE-2023-3766
CVE.ORG link : CVE-2023-3766
JSON object : View
Products Affected
cloudflare
- odoh-rs
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')