mellium.im/sasl authentication failure due to insufficient nonce randomness
Critical severity
GitHub Reviewed
Published
Dec 31, 2022
to the GitHub Advisory Database
•
Updated May 20, 2024
Description
Published by the National Vulnerability Database
Dec 31, 2022
Published to the GitHub Advisory Database
Dec 31, 2022
Reviewed
Jan 4, 2023
Last updated
May 20, 2024
An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.
References