snykiotcubedev / godot-3.3-stable

MIT License
0 stars 0 forks source link

CVE-2022-35409 (Critical) detected in godot3.4.2-stable, godot3.4.2-stable #74

Open mend-bolt-for-github[bot] opened 3 months ago

mend-bolt-for-github[bot] commented 3 months ago

CVE-2022-35409 - Critical Severity Vulnerability

Vulnerable Libraries - godot3.4.2-stable, godot3.4.2-stable

Vulnerability Details

An issue was discovered in Mbed TLS before 2.28.1 and 3.x before 3.2.0. In some configurations, an unauthenticated attacker can send an invalid ClientHello message to a DTLS server that causes a heap-based buffer over-read of up to 255 bytes. This can cause a server crash or possibly information disclosure based on error responses. Affected configurations have MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled and MBEDTLS_SSL_IN_CONTENT_LEN less than a threshold that depends on the configuration: 258 bytes if using mbedtls_ssl_cookie_check, and possibly up to 571 bytes with a custom cookie check function.

Publish Date: 2022-07-15

URL: CVE-2022-35409

CVSS 3 Score Details (9.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://security-tracker.debian.org/tracker/CVE-2022-35409

Release Date: 2022-07-15

Fix Resolution: mbedtls-2.28.1;v3.2.0


Step up your Open Source Security Game with Mend here