CVE-2021-4239
CVSS V2 None
CVSS V3 None
Description
The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.
Overview
- CVE ID
- CVE-2021-4239
- Assigner
- security@golang.org
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-27T22:15:12
- Last Modified Date
- 2023-01-06T01:30:52
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:noiseprotocol:noise:-:*:*:*:*:go:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://github.com/flynn/noise/pull/44 | |
https://pkg.go.dev/vuln/GO-2022-0425 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-4239 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4239 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-27 23:14:59 | Added to TrackCVE | |||
2022-12-28 12:14:49 | 2022-12-28T10:18:56 | CVE Modified Date | updated | |
2022-12-28 12:14:49 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-04 17:14:34 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-06 03:18:36 | 2023-01-06T01:30:52 | CVE Modified Date | updated | |
2023-01-06 03:18:36 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-06 03:18:37 | Weakness Enumeration | new | ||
2023-01-06 03:18:39 | CPE Information | updated |