CVE-2022-29189 – github.com/pion/dtls
Package
Manager: go
Name: github.com/pion/dtls
Vulnerable Version: >=0 <2.1.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00895 pctl0.74715
Details
Pion/DTLS contains buffer for inbound DTLS fragments with no limit ### Impact A buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or times out. An attacker could exploit this to cause excessive memory usage. ### Patches Upgrade to Pion DTLS v2.1.4 ### Workarounds No workarounds available, upgrade to Pion DTLS v2.1.4 ### References Thank you to [Juho Nurminen](https://github.com/jupenur) and the Mattermost team for discovering and reporting this. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Pion DTLS](http://github.com/pion/dtls) * Email us at [team@pion.ly](mailto:team@pion.ly)
Metadata
Created: 2022-05-24T22:04:38Z
Modified: 2023-08-29T23:31:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-cx94-mrg9-rq4j/GHSA-cx94-mrg9-rq4j.json
CWE IDs: ["CWE-120"]
Alternative ID: GHSA-cx94-mrg9-rq4j
Finding: F316
Auto approve: 1