{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T07:34:18.279","vulnerabilities":[{"cve":{"id":"CVE-2023-46239","sourceIdentifier":"security-advisories@github.com","published":"2023-10-31T16:15:09.543","lastModified":"2024-11-21T08:28:08.667","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"quic-go is an implementation of the QUIC protocol in Go. Starting in version 0.37.0 and prior to version 0.37.3, by serializing an ACK frame after the CRYTPO that allows a node to complete the handshake, a remote node could trigger a nil pointer dereference (leading to a panic) when the node attempted to drop the Handshake packet number space. An attacker can bring down a quic-go node with very minimal effort. Completing the QUIC handshake only requires sending and receiving a few packets. Version 0.37.3 contains a patch. Versions before 0.37.0 are not affected."},{"lang":"es","value":"quic-go es una implementación del protocolo QUIC en Go. A partir de la versión 0.37.0 y antes de la versión 0.37.3, al serializar una trama ACK después de CRYTPO que permite que un nodo complete el protocolo de enlace, un nodo remoto podría desencadenar una desreferencia de puntero nulo (lo que lleva a pánico) cuando el nodo intenta para eliminar el espacio del número del paquete Handshake. Un atacante puede derribar un nodo rápido con un esfuerzo mínimo. Completar el protocolo de enlace QUIC solo requiere enviar y recibir algunos paquetes. La versión 0.37.3 contiene un parche. Las versiones anteriores a la 0.37.0 no se ven afectadas."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-248"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*","versionStartIncluding":"0.37.0","versionEndExcluding":"0.37.3","matchCriteriaId":"A4D3D28F-FF90-4B7E-99E8-64325B9B7D08"}]}]}],"references":[{"url":"https://github.com/quic-go/quic-go/commit/b6a4725b60f1fe04e8f1ddcc3114e290fcea1617","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/quic-go/quic-go/releases/tag/v0.37.3","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/quic-go/quic-go/security/advisories/GHSA-3q6m-v84f-6p9h","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/quic-go/quic-go/commit/b6a4725b60f1fe04e8f1ddcc3114e290fcea1617","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/quic-go/quic-go/releases/tag/v0.37.3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://github.com/quic-go/quic-go/security/advisories/GHSA-3q6m-v84f-6p9h","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}