Integer Overflow or Wraparound Affecting github.com/katzenpost/noise package, versions <0.0.3
Threat Intelligence
EPSS
0.08% (35th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMKATZENPOSTNOISE-1583458
- published 9 Sep 2021
- disclosed 8 Sep 2021
- credit Unknown
Introduced: 8 Sep 2021
CVE-2021-4239 Open this link in a new tabHow to fix?
Upgrade github.com/katzenpost/noise
to version 0.0.3 or higher.
Overview
github.com/katzenpost/noise is a Noise Protocol Framework: Katzenpost fork of the flynn noise library.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound. If 2^64 (~18.4 quintillion) or more messages are encrypted with Encrypt
after handshaking, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce, resulting in a potentially catastrophic weakening of the security properties of the symmetric cipher.
References
CVSS Scores
version 3.1