← Retour aux CVEs
CVE-2019-20786
CRITICAL9.8
Description
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie4/19/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
pion:dtls
Faiblesses (CWE)
CWE-287
References
https://github.com/pion/dtls/compare/v1.5.1...v1.5.2(cve@mitre.org)
https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/pion/dtls/compare/v1.5.1...v1.5.2(af854a3a-2127-422b-91ae-364da2661108)
https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean(af854a3a-2127-422b-91ae-364da2661108)
https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.