Описание
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
Ссылки
- PatchThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.5.2 (исключая)
cpe:2.3:a:pion:dtls:*:*:*:*:*:*:*:*
EPSS
Процентиль: 79%
0.0122
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-287
Связанные уязвимости
EPSS
Процентиль: 79%
0.0122
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-287