{"id":"CVE-2023-46239","summary":"quic-go vulnerable to pointer dereference that can lead to panic","details":"quic-go is an implementation of the QUIC protocol in Go. Starting in version 0.37.0 and prior to version 0.37.3, by serializing an ACK frame after the CRYTPO that allows a node to complete the handshake, a remote node could trigger a nil pointer dereference (leading to a panic) when the node attempted to drop the Handshake packet number space. An attacker can bring down a quic-go node with very minimal effort. Completing the QUIC handshake only requires sending and receiving a few packets. Version 0.37.3 contains a patch. Versions before 0.37.0 are not affected.","aliases":["GHSA-3q6m-v84f-6p9h","GO-2023-2160"],"modified":"2026-05-19T11:56:02.907510843Z","published":"2023-10-31T15:02:03.413Z","database_specific":{"cwe_ids":["CWE-248"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46239.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/quic-go/quic-go/releases/tag/v0.37.3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46239.json"},{"type":"ADVISORY","url":"https://github.com/quic-go/quic-go/security/advisories/GHSA-3q6m-v84f-6p9h"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46239"},{"type":"FIX","url":"https://github.com/quic-go/quic-go/commit/b6a4725b60f1fe04e8f1ddcc3114e290fcea1617"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/quic-go/quic-go","events":[{"introduced":"469a6153b6798780bf90e8be37f197d0fcb18af2"},{"fixed":"b6a4725b60f1fe04e8f1ddcc3114e290fcea1617"}]}],"versions":["v0.37.2","v0.37.1","v0.37.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-46239.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}