{"id":"RUSTSEC-2023-0082","summary":"phonenumber:  panic on parsing crafted RF3966 phonenumber inputs","details":"### Impact\nThe phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string.\n\nIn a typical deployment of `rust-phonenumber`, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string `.;phone-context=`.\n\n### Patches\nPatches will be published as version `0.3.3+8.13.9` and backported as `0.2.5+8.11.3`.","aliases":["CVE-2023-42444","GHSA-whhr-7f2w-qqj2"],"modified":"2026-03-13T06:56:59.121516Z","published":"2023-09-19T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/phonenumber"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2023-0082.html"},{"type":"ADVISORY","url":"https://github.com/whisperfish/rust-phonenumber/security/advisories/GHSA-whhr-7f2w-qqj2"},{"type":"ADVISORY","url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42444"}],"affected":[{"package":{"name":"phonenumber","ecosystem":"crates.io","purl":"pkg:cargo/phonenumber"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.2.5"},{"introduced":"0.3.0"},{"fixed":"0.3.3"}]}],"ecosystem_specific":{"affects":{"functions":["phonenumber::parse"],"arch":[],"os":[]},"affected_functions":null},"database_specific":{"cvss":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","categories":["denial-of-service"],"informational":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2023-0082.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}]}