First published: Mon Oct 30 2023(Updated: )
quic-go is an implementation of the [QUIC](https://datatracker.ietf.org/doc/html/rfc9000) transport protocol in Go. By serializing an ACK frame after the CRYTPO that allows a node to complete the handshake, a remote node could trigger a nil pointer dereference (leading to a panic) when the node attempted to drop the Handshake packet number space. **Impact** An attacker can bring down a quic-go node with very minimal effort. Completing the QUIC handshake only requires sending and receiving a few packets. **Patches** [v0.37.3](https://github.com/quic-go/quic-go/releases/tag/v0.37.3) contains a patch. Versions before v0.37.0 are not affected.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/quic-go/quic-go | >=0.37.0<0.37.3 | 0.37.3 |
quic-go | >=0.37.0<0.37.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46239 is a vulnerability in the quic-go implementation of the QUIC transport protocol in Go that allows a remote node to trigger a nil pointer dereference, leading to a panic, by serializing an ACK frame after the CRYTPO stage in the handshake.
The quic-go package version 0.37.0 up to version 0.37.3 is affected by CVE-2023-46239.
The severity of CVE-2023-46239 is not specified.
To fix CVE-2023-46239, update to quic-go version 0.37.3 or later.
You can find more information about CVE-2023-46239 on the GitHub security advisory page at https://github.com/quic-go/quic-go/security/advisories/GHSA-3q6m-v84f-6p9h.