Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-27191 CVE-2022-28327 CVE-2022-24675 |
CWE-ID | CWE-327 CWE-190 CWE-120 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Go programming language Universal components / Libraries / Scripting languages |
Vendor |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
Updated 13.04.2022
Added fixed version.
Updated 14.06.2022
Added vulnerabilities #2-3.
EUVDB-ID: #VU62039
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-27191
CWE-ID:
CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in golang.org/x/crypto/ssh before 0.0.0-20220314234659-1baeb1ce4c0b, as used in Go programming language. A remote attacker can crash a server in certain circumstances involving AddHostKey.
MitigationInstall update from vendor's website.
Vulnerable software versionsGo programming language: 1.16 - 1.17.8
CPE2.3 External linkshttp://groups.google.com/g/golang-announce/c/-cp44ypCT5s
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU64269
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-28327
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to integer overflow in the Golang's library crypto/elliptic. A remote attacker can send a specially crafted scalar input longer than 32 bytes to cause P256().ScalarMult or P256().ScalarBaseMult to panic and perform a denial of service attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsGo programming language: 1 - 1.18
CPE2.3 External linkshttp://groups.google.com/g/golang-announce
http://groups.google.com/g/golang-announce/c/oecdBNLOml8
http://bugzilla.redhat.com/show_bug.cgi?id=2077689
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU64266
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-24675
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the Golang's library encoding/pem. A remote attacker can send to victim a large (more than 5 MB) PEM input to cause a stack overflow in Decode and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsGo programming language: 1 - 1.18
CPE2.3 External linkshttp://groups.google.com/g/golang-announce
http://groups.google.com/g/golang-announce/c/oecdBNLOml8
http://bugzilla.redhat.com/show_bug.cgi?id=2077688
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?