CVE-2021-4239

The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.
References
Link Resource
https://github.com/flynn/noise/pull/44 Patch Third Party Advisory
https://pkg.go.dev/vuln/GO-2022-0425 Patch Vendor Advisory
https://github.com/flynn/noise/pull/44 Patch Third Party Advisory
https://pkg.go.dev/vuln/GO-2022-0425 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:noiseprotocol:noise:-:*:*:*:*:go:*:*

History

21 Nov 2024, 06:37

Type Values Removed Values Added
References () https://github.com/flynn/noise/pull/44 - Patch, Third Party Advisory () https://github.com/flynn/noise/pull/44 - Patch, Third Party Advisory
References () https://pkg.go.dev/vuln/GO-2022-0425 - Patch, Vendor Advisory () https://pkg.go.dev/vuln/GO-2022-0425 - Patch, Vendor Advisory

Information

Published : 2022-12-27 22:15

Updated : 2024-11-21 06:37


NVD link : CVE-2021-4239

Mitre link : CVE-2021-4239

CVE.ORG link : CVE-2021-4239


JSON object : View

Products Affected

noiseprotocol

  • noise
CWE
CWE-311

Missing Encryption of Sensitive Data