Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
2019-10-24T22:15:10.407
2024-11-21T04:32:36.500
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | golang | go | < 1.12.11 | Yes |
Application | golang | go | < 1.13.2 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Operating System | fedoraproject | fedora | 30 | Yes |
Operating System | fedoraproject | fedora | 31 | Yes |
Application | redhat | developer_tools | 1.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |
Operating System | redhat | enterprise_linux_server | 8.1 | Yes |
Operating System | opensuse | leap | 15.0 | Yes |
Operating System | opensuse | leap | 15.1 | Yes |
Application | arista | cloudvision_portal | ≤ 2018.2.3 | Yes |
Application | arista | cloudvision_portal | 2019.1.0 | Yes |
Application | arista | cloudvision_portal | 2019.1.1 | Yes |
Application | arista | cloudvision_portal | 2019.1.2 | Yes |
Application | arista | terminattr | ≤ 1.7.2 | Yes |
Operating System | arista | eos | ≤ 4.23.1f | Yes |
Operating System | arista | mos | ≤ 0.25 | Yes |