A buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or times out. An attacker could exploit this to cause excessive memory usage.
Upgrade to Pion DTLS v2.1.4
No workarounds available, upgrade to Pion DTLS v2.1.4
Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.
If you have any questions or comments about this advisory: * Open an issue in Pion DTLS * Email us at team@pion.ly
{ "nvd_published_at": "2022-05-21T00:15:00Z", "cwe_ids": [ "CWE-120" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-05-24T22:04:38Z" }