VYPR
Critical severityNVD Advisory· Published Dec 31, 2020· Updated Aug 5, 2024

CVE-2019-25004

CVE-2019-25004

Description

An issue was discovered in the flatbuffers crate before 0.6.1 for Rust. Arbitrary bytes can be reinterpreted as a bool, defeating soundness.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Flatbuffers Rust crate before 0.6.1 allows arbitrary bytes to be reinterpreted as a bool, causing undefined behavior.

Vulnerability

Description

The flatbuffers crate for Rust, prior to version 0.6.1, contains an unsound implementation of the Follow trait for the bool type [1]. The Follow::follow function uses read_scalar_at::, which effectively performs a transmute from arbitrary bytes to a bool [4]. This violates Rust's type safety guarantees, as a bool must only have the bit patterns 0x00 or 0x01. Any other byte value results in an invalid boolean, leading to undefined behavior (UB).

Exploitation

Conditions

An attacker can trigger the vulnerability by providing malicious serialized data crafted with a byte that is not 0 or 1 in a position where a bool is expected [2]. The affected function is invoked when deserializing FlatBuffers messages. No special authentication or network position is required; any application using the vulnerable crate to parse untrusted input is at risk. The attack vector is network-based, with low complexity and no privileges required, as reflected in the CVSS score of 9.8 [2].

Impact

Exploitation can lead to undefined behavior, which may manifest as memory corruption, crashes, or potential code execution. Since UB undermines all safety guarantees in Rust, it could allow an attacker to bypass security checks or cause denial of service. The high CVSS score indicates severe impact on confidentiality, integrity, and availability [2].

Mitigation

The flaw was addressed in flatbuffers version 0.6.1 by correcting the Follow implementation to properly validate boolean values [2]. Users should update to 0.6.1 or later. Versions prior to 0.4.0 are also unaffected, but the advisory recommends upgrading to the patched release [2]. No workaround is available other than updating.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
flatbufferscrates.io
>= 0.4.0, < 0.6.10.6.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.