The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
2016-05-23T19:59:04.477
2025-04-12T10:46:40.837
Deferred
CVSSv3.0: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | opensuse | leap | 42.1 | Yes |
Application | golang | go | 1.6 | Yes |
Operating System | fedoraproject | fedora | 22 | Yes |
Operating System | fedoraproject | fedora | 23 | Yes |
Operating System | fedoraproject | fedora | 24 | Yes |
Application | golang | go | ≤ 1.5 | Yes |