Vulnerability CVE-2022-29189


Published: 2022-05-21

Description:
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.

Type:

CWE-120

(Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))

 References:
https://github.com/pion/dtls/commit/a6397ff7282bc56dc37a68ea9211702edb4de1de
https://github.com/pion/dtls/security/advisories/GHSA-cx94-mrg9-rq4j
https://github.com/pion/dtls/releases/tag/v2.1.4

Copyright 2022, cxsecurity.com

 

Back to Top