CVE-2023-49295

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-49295
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-49295.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-49295
Aliases
Downstream
Related
Published
2024-01-10T21:40:58Z
Modified
2025-10-26T04:15:49.199136Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H CVSS Calculator
Summary
quic-go's path validation mechanism can cause denial of service
Details

quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATHCHALLENGE frames. The receiver is supposed to respond to each PATHCHALLENGE frame with a PATHRESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATHRESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4.

Database specific
{
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

Git / github.com/lucas-clemente/quic-go

Affected ranges

Type
GIT
Repo
https://github.com/lucas-clemente/quic-go
Events

Affected versions

v0.*

v0.38.0
v0.38.1

Git / github.com/quic-go/quic-go

Affected versions

v.*

v.0.21

v0.*

v0.21.0
v0.21.1
v0.22.0
v0.23.0
v0.24.0
v0.25.0
v0.26.0
v0.27.0
v0.28.0
v0.28.1
v0.29.0
v0.30.0
v0.31.0
v0.31.1
v0.32.0
v0.33.0
v0.34.0
v0.35.0
v0.35.1
v0.36.0
v0.37.0
v0.37.1
v0.37.2
v0.37.3
v0.37.4
v0.37.5
v0.37.6
v0.38.0
v0.38.1
v0.39.0
v0.39.1
v0.39.2
v0.39.3
v0.4
v0.40.0
v0.5.0
v0.6.0
v0.7.0