Improper input validation in Go programming language - CVE-2018-16875

 

Improper input validation in Go programming language - CVE-2018-16875

Published: December 14, 2018


Vulnerability identifier: #VU16546
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-16875
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Google
Affected software:
Go programming language

Detailed vulnerability description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists on Go TLS servers accepting client certificates and TLS clients due to the crypto/x509 package does not limit the amount of work performed for each chain verification. A remote unauthenticated attacker can craft pathological inputs leading to a CPU denial of service.


How to mitigate CVE-2018-16875

The vulnerability has been fixed in the version 1.10.6, 1.11.3.

Sources