CVE-2019-20786

handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pion:dtls:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:39

Type Values Removed Values Added
References () https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0 - Patch, Third Party Advisory () https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0 - Patch, Third Party Advisory
References () https://github.com/pion/dtls/compare/v1.5.1...v1.5.2 - Patch, Third Party Advisory () https://github.com/pion/dtls/compare/v1.5.1...v1.5.2 - Patch, Third Party Advisory
References () https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean - Third Party Advisory () https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean - Third Party Advisory
References () https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf - Exploit, Third Party Advisory () https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf - Exploit, Third Party Advisory

Information

Published : 2020-04-19 20:15

Updated : 2024-11-21 04:39


NVD link : CVE-2019-20786

Mitre link : CVE-2019-20786

CVE.ORG link : CVE-2019-20786


JSON object : View

Products Affected

pion

  • dtls
CWE
CWE-287

Improper Authentication