{"url":"http://public2.vulnerablecode.io/api/packages/71250?format=json","purl":"pkg:golang/github.com/quic-go/quic-go@0.37.3","type":"golang","namespace":"github.com/quic-go","name":"quic-go","version":"0.37.3","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"0.37.7","latest_non_vulnerable_version":"0.57.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30469?format=json","vulnerability_id":"VCID-sc4h-pbrk-duf6","summary":"quic-go vulnerable to pointer dereference that can lead to panic\nquic-go is an implementation of the [QUIC](https://datatracker.ietf.org/doc/html/rfc9000) transport protocol in Go. By serializing an ACK frame after the CRYTPO that allows a node to complete the handshake, a remote node could trigger a nil pointer dereference (leading to a panic) when the node attempted to drop the Handshake packet number space.\n\n**Impact**\n\nAn attacker can bring down a quic-go node with very minimal effort. Completing the QUIC handshake only requires sending and receiving a few packets.\n\n**Patches**\n\n[v0.37.3](https://github.com/quic-go/quic-go/releases/tag/v0.37.3) contains a patch. Versions before v0.37.0 are not affected.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46239","reference_id":"","reference_type":"","scores":[{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62606","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62601","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62581","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.6251","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62507","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46239"},{"reference_url":"https://github.com/quic-go/quic-go","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/quic-go/quic-go"},{"reference_url":"https://github.com/quic-go/quic-go/commit/b6a4725b60f1fe04e8f1ddcc3114e290fcea1617","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-05T17:36:38Z/"}],"url":"https://github.com/quic-go/quic-go/commit/b6a4725b60f1fe04e8f1ddcc3114e290fcea1617"},{"reference_url":"https://github.com/quic-go/quic-go/releases/tag/v0.37.3","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-05T17:36:38Z/"}],"url":"https://github.com/quic-go/quic-go/releases/tag/v0.37.3"},{"reference_url":"https://github.com/quic-go/quic-go/security/advisories/GHSA-3q6m-v84f-6p9h","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-05T17:36:38Z/"}],"url":"https://github.com/quic-go/quic-go/security/advisories/GHSA-3q6m-v84f-6p9h"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46239","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46239"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71250?format=json","purl":"pkg:golang/github.com/quic-go/quic-go@0.37.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:golang/github.com/quic-go/quic-go@0.37.3"}],"aliases":["CVE-2023-46239","GHSA-3q6m-v84f-6p9h"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sc4h-pbrk-duf6"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:golang/github.com/quic-go/quic-go@0.37.3"}