Описание
Improper Authenication in Pion DTLS
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-20786
- https://github.com/pion/dtls/pull/128
- https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0
- https://github.com/pion/dtls/compare/v1.5.1...v1.5.2
- https://pkg.go.dev/vuln/GO-2020-0038
- https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean
- https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf
Пакеты
Наименование
github.com/pion/dtls
go
Затронутые версииВерсия исправления
< 1.5.2
1.5.2
Связанные уязвимости
CVSS3: 9.8
nvd
почти 6 лет назад
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.