Memory exhaustion in QUIC connection handling in crypto/tls
CVE-2023-39322
7.5HIGH
What is CVE-2023-39322?
The vulnerability arises from QUIC connections lacking an upper limit on the data buffered when processing post-handshake messages. This oversight permits a malicious QUIC connection to exploit the system, leading to unbounded memory growth. The issue has been addressed in recent updates, which now enforce a restriction on message size at 65KiB, effectively mitigating the potential for excessive resource consumption and maintaining system integrity.
Affected Version(s)
crypto/tls 1.21.0-0 < 1.21.1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marten Seemann