Executive Summary

Informations
Name CVE-2025-29785 First vendor Publication 2025-06-02
Vendor Cve Last vendor Modification 2025-06-02

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

quic-go is an implementation of the QUIC protocol in Go. The loss recovery logic for path probe packets that was added in the v0.50.0 release can be used to trigger a nil-pointer dereference by a malicious QUIC client. In order to do so, the attacker first sends valid QUIC packets from different remote addresses (thereby triggering the newly added path validation logic: the server sends path probe packets), and then sending ACKs for packets received from the server specifically crafted to trigger the nil-pointer dereference. v0.50.1 contains a patch that fixes the vulnerability. This release contains a test that generates random sequences of sent packets (both regular and path probe packets), that was used to verify that the patch actually covers all corner cases. No known workarounds are available.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29785

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-248 Uncaught Exception

Sources (Detail)

https://github.com/quic-go/quic-go/commit/b90058aba5f65f48e0e150c89bbaa21a72d...
https://github.com/quic-go/quic-go/issues/4981
https://github.com/quic-go/quic-go/security/advisories/GHSA-j972-j939-p2v3
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-06-03 00:20:33
  • Multiple Updates
2025-06-02 17:20:35
  • First insertion