CVE-2020-36513
Description
An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. read_up_to may read from uninitialized memory locations.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The acc_reader crate for Rust up to 2020-12-27 reads from uninitialized memory in fill_buf() and read_up_to(), enabling undefined behavior.
Vulnerability
The acc_reader crate through version 2020-12-27 contains a memory-safety issue in its fill_buf() and read_up_to() methods. The fill_buf() implementation (as shown in the BufRead impl) uses unsafe code to grow the internal buffer without initializing the new capacity, then passes a slice of that uninitialized buffer to a user-provided Read implementation. Any Read implementation can read from this uninitialized memory, producing undefined values and potentially triggering undefined behavior. The read_up_to() function suffers from the same flaw [1][3].
Exploitation
An attacker can exploit this by crafting a malicious Read implementation that reads from the uninitialized buffer passed by the acc_reader. No special network position or authentication is required; the attacker only needs to control the Read source provided to AccReader. The vulnerable code path is triggered whenever fill_buf() or read_up_to() is called and the internal buffer needs to be extended (i.e., when available == 0) [1].
Impact
Successful exploitation leads to reading uninitialized memory, which can expose sensitive data or produce undefined values. Since undefined values can propagate, this can quickly lead to undefined behavior, potentially including crashes, logic errors, or other memory-safety violations. The vulnerability is classified as a memory-exposure issue and can compromise the confidentiality and integrity of the application [3].
Mitigation
As of the latest advisory (June 2023), no patched version of the acc_reader crate has been released. The maintainer has indicated they are no longer able to support the library, so no fix is forthcoming [3][4]. Users should avoid using the acc_reader crate and migrate to an alternative library. The crate is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
acc_readercrates.io | <= 2.0.0 | — |
Affected products
2- acc_reader/acc_readerdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-799f-r78p-gq9cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-36513ghsaADVISORY
- github.com/netvl/acc_reader/issues/1ghsaWEB
- raw.githubusercontent.com/rustsec/advisory-db/main/crates/acc_reader/RUSTSEC-2020-0155.mdghsax_refsource_MISCWEB
- rustsec.org/advisories/RUSTSEC-2020-0155.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.