- Description
- The openssl crate before 0.10.55 for Rust allows an out-of-bounds read via an empty string to X509VerifyParamRef::set_host.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- openssl
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
- Severity
- CRITICAL
- cve@mitre.org
- CWE-126
- Hype score
- Not currently trending
🚨 New CVE Alert: CVE-2023-53159 🐛 Out-of-Bounds Read in Rust OpenSSL crate 📉 CVSS 4.5 (Medium) ⚠️ Triggered via X509VerifyParamRef::set_host("") 🔍 Check your dependencies! 📘 Our annotated report: https://t.co/QdYMipWdJ3 #CyberSecurity #RustLang #OpenSSL http
@BaseFortify
28 Jul 2025
61 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-53159: Rust OpenSSL crate <0.10.55 crashes on empty hostnames, reading memory it shouldn’t. Upgrade to 0.10.55+ now. More info ➡️ https://t.co/zwAO95GpIS #RustLang #OpenSSL #infosec
@VolerionSec
28 Jul 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sfackler:openssl:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "57EF18B7-20B6-4EA8-BE0D-732910E67318",
"versionEndExcluding": "0.10.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]