GHSA-4xgv-j62q-h3rj: Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2
5.9
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
2/7/2023
Updated
6/13/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/pion/dtls/v2 | go | < 2.2.4 | 2.2.4 |
| github.com/pion/dtls | go | <= 1.5.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the Unmarshal method of MessageHelloVerifyRequest. The commit diff shows the fix explicitly modifies this function by changing cookieLength handling from a byte + cast to a direct int. This addresses a scenario where insufficient buffer validation could cause a panic. The Go vulnerability report (GO-2023-1534) explicitly lists this function as affected, and the patch directly targets this method. The combination of code analysis, commit context, and advisory references confirms this as the vulnerable function.