Lucene search

K
cve[email protected]CVE-2023-46239
HistoryOct 31, 2023 - 4:15 p.m.

CVE-2023-46239

2023-10-3116:15:09
CWE-248
CWE-476
web.nvd.nist.gov
43
quic-go
vulnerability
security
nil pointer
dereference
go
protocol
nvd
cve-2023-46239

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

21.4%

quic-go is an implementation of the QUIC protocol in Go. Starting in version 0.37.0 and prior to version 0.37.3, by serializing an ACK frame after the CRYTPO that allows a node to complete the handshake, a remote node could trigger a nil pointer dereference (leading to a panic) when the node attempted to drop the Handshake packet number space. An attacker can bring down a quic-go node with very minimal effort. Completing the QUIC handshake only requires sending and receiving a few packets. Version 0.37.3 contains a patch. Versions before 0.37.0 are not affected.

Affected configurations

Vulners
NVD
Node
quic-goquic_goRange0.37.00.37.3

CNA Affected

[
  {
    "vendor": "quic-go",
    "product": "quic-go",
    "versions": [
      {
        "version": ">= 0.37.0, < 0.37.3",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

21.4%