github.com/pion/dtls is vulnerable to buffer overflow. The vulnerability exists in fragment_buffer.go
because no upper limit of fragmentBuffer
of network traffic is not defined which allows an attacker to cause an excessive memory usage which then leads to an application crash.