blob: e4ae308cd2bebba245f67b87fafb1fefece781dc [file] [log] [blame]
modules:
- module: github.com/pion/webrtc/v3
versions:
- fixed: 3.0.15
vulnerable_at: 3.0.14
packages:
- package: github.com/pion/webrtc/v3
symbols:
- DTLSTransport.Start
derived_symbols:
- PeerConnection.AddTrack
- PeerConnection.AddTransceiverFromKind
- PeerConnection.AddTransceiverFromTrack
- PeerConnection.CreateDataChannel
- PeerConnection.RemoveTrack
- PeerConnection.SetLocalDescription
- PeerConnection.SetRemoteDescription
- operations.Done
- operations.Enqueue
summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
description: |
Due to improper error handling, DTLS connections were not killed when certificate verification
failed, causing users who did not check the connection state to continue to use the connection.
This could allow allow an attacker which holds the ICE password, but not a valid certificate,
to bypass this restriction.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2021-28681
ghsas:
- GHSA-74xm-qj29-cq8p
credits:
- Gaukas Wang (@Gaukas)
references:
- fix: https://github.com/pion/webrtc/pull/1709
- fix: https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e
- web: https://github.com/pion/webrtc/issues/1708