Integer Overflow or Wraparound Affecting github.com/katzenpost/noise Open this link in a new tab package, versions <0.0.3
Attack Complexity
Low
Confidentiality
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-GOLANG-GITHUBCOMKATZENPOSTNOISE-1583458
-
published
9 Sep 2021
-
disclosed
8 Sep 2021
-
credit
Unknown
Introduced: 8 Sep 2021
CWE-190 Open this link in a new tabHow to fix?
Upgrade github.com/katzenpost/noise
to version 0.0.3 or higher.
Overview
github.com/katzenpost/noise is a Noise Protocol Framework: Katzenpost fork of the flynn noise library.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound. If 2^64 (~18.4 quintillion) or more messages are encrypted with Encrypt
after handshaking, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce, resulting in a potentially catastrophic weakening of the security properties of the symmetric cipher.