VYPR
Critical severityNVD Advisory· Published Dec 26, 2021· Updated Aug 4, 2024

CVE-2020-36513

CVE-2020-36513

Description

An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. read_up_to may read from uninitialized memory locations.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The acc_reader crate for Rust up to 2020-12-27 reads from uninitialized memory in fill_buf() and read_up_to(), enabling undefined behavior.

Vulnerability

The acc_reader crate through version 2020-12-27 contains a memory-safety issue in its fill_buf() and read_up_to() methods. The fill_buf() implementation (as shown in the BufRead impl) uses unsafe code to grow the internal buffer without initializing the new capacity, then passes a slice of that uninitialized buffer to a user-provided Read implementation. Any Read implementation can read from this uninitialized memory, producing undefined values and potentially triggering undefined behavior. The read_up_to() function suffers from the same flaw [1][3].

Exploitation

An attacker can exploit this by crafting a malicious Read implementation that reads from the uninitialized buffer passed by the acc_reader. No special network position or authentication is required; the attacker only needs to control the Read source provided to AccReader. The vulnerable code path is triggered whenever fill_buf() or read_up_to() is called and the internal buffer needs to be extended (i.e., when available == 0) [1].

Impact

Successful exploitation leads to reading uninitialized memory, which can expose sensitive data or produce undefined values. Since undefined values can propagate, this can quickly lead to undefined behavior, potentially including crashes, logic errors, or other memory-safety violations. The vulnerability is classified as a memory-exposure issue and can compromise the confidentiality and integrity of the application [3].

Mitigation

As of the latest advisory (June 2023), no patched version of the acc_reader crate has been released. The maintainer has indicated they are no longer able to support the library, so no fix is forthcoming [3][4]. Users should avoid using the acc_reader crate and migrate to an alternative library. The crate is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
acc_readercrates.io
<= 2.0.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.