The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.
References
Link Resource
https://github.com/flynn/noise/pull/44 Patch Third Party Advisory
https://pkg.go.dev/vuln/GO-2022-0425 Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Go

Published: 2022-12-27T21:13:53.590Z

Updated: 2023-06-12T19:04:19.549Z

Reserved: 2022-07-29T20:06:51.345Z


Link: CVE-2021-4239

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-12-27T22:15:12.123

Modified: 2023-01-06T01:30:52.057


Link: CVE-2021-4239

JSON object: View

cve-icon Redhat Information

No data.

CWE