Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-29189
HistoryMay 20, 2022 - 11:55 p.m.

CVE-2022-29189 Buffer for inbound DTLS fragments has no limit

2022-05-2023:55:16
CWE-120
GitHub_M
www.cve.org
5
cve-2022-29189
pion dtls
buffer overflow
inbound traffic
patch
excessive memory

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.004

Percentile

74.6%

Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.

CNA Affected

[
  {
    "product": "dtls",
    "vendor": "pion",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.1.4"
      }
    ]
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.004

Percentile

74.6%