CVE-2021-4239 – github.com/flynn/noise
Package
Manager: go
Name: github.com/flynn/noise
Vulnerable Version: >=0 <1.0.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00086 pctl0.25714
Details
Noise vulnerable to denial of service Noise is a Go implementation of the Noise Protocol Framework. The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.
Metadata
Created: 2022-12-28T00:30:23Z
Modified: 2023-02-09T21:41:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-6cr6-fmvc-vw2p/GHSA-6cr6-fmvc-vw2p.json
CWE IDs: ["CWE-311"]
Alternative ID: GHSA-6cr6-fmvc-vw2p
Finding: F020
Auto approve: 1