Impact
The time crate suffered a denial‑of‑service vulnerability that could be triggered by feeding malicious input to RFC 2822 parsing routines. Attackers can craft input that triggers deeply nested recursion, causing the call stack to overflow. This results in an application crash or unresponsive state, compromising availability. The weakness lies in CWE‑770 (Excessive Resource Consumption) with a stack‑based exhaustion scenario linked to CWE‑121.
Affected Systems
The vulnerability affects the time-rs time crate in the Rust ecosystem. All releases from version 0.3.6 through 0.3.46 are susceptible; this was introduced in 0.3.6 and patched in 0.3.47. Users of earlier or later 0.3.x series are not impacted.
Risk and Exploitability
The CVSS score is 6.8, indicating medium severity, and the EPSS score is below 1 %, reflecting a low likelihood of exploitation in the wild. The flaw is not listed in the CISA KEV catalog, but it could be leveraged in any application that accepts unchecked user input to RFC 2822 parsing. The exploit requires constructing specific RFC 2822 messages; ordinary input will never reach the hazardous recursion depth.
OpenCVE Enrichment
Github GHSA