Vulnerability identifier: #VU66062
Vulnerability risk: Medium
Exploitation vector: Network
Exploit availability: No
Go programming language
Universal components / Libraries / Scripting languages
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in Reader.Read method when handling an archive that contains a large number of concatenated 0-length compressed files. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
Install updates from vendor's website.
Vulnerable software versions
Go programming language: 1.18 - 1.18.3, 1.17 - 1.17.11
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?