CVE-2018-20997
Description
An issue was discovered in the openssl crate before 0.10.9 for Rust. A use-after-free occurs in CMS Signing.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Use-after-free in CMS Signing in Rust's openssl crate (before 0.10.9) allows remote attackers to cause memory corruption or crash.
Vulnerability
Overview
The openssl crate for Rust, which provides bindings to OpenSSL, contained a use-after-free vulnerability in its CMS (Cryptographic Message Syntax) signing functionality. The root cause was improper memory management: a reference to freed memory was used after deallocation during CMS signing operations [1][3].
Exploitation
This vulnerability can be triggered remotely without authentication or user interaction. The CVSS vector (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates a network attack vector with low complexity, no privileges required, and no user interaction needed [2][3]. An attacker could craft a malicious CMS message that, when processed by an application using the vulnerable crate, triggers the use-after-free.
Impact
Successful exploitation could lead to memory corruption, potentially allowing arbitrary code execution, denial of service, or information disclosure. The CVSS score of 9.8 (Critical) reflects the high impact on confidentiality, integrity, and availability [2][3].
Mitigation
The issue was patched in openssl crate version 0.10.9. Users should update to at least this version. The RustSec advisory (RUSTSEC-2018-0010) provides full details and references the fix [1][3].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
opensslcrates.io | >= 0.10.8, < 0.10.9 | 0.10.9 |
Affected products
2- Rust/openssldescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-xjxc-vfw2-cg96ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-20997ghsaADVISORY
- github.com/sfackler/rust-openssl/pull/942ghsaWEB
- rustsec.org/advisories/RUSTSEC-2018-0010.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.