// For flags

CVE-2018-16875

Gentoo Linux Security Advisory 201812-09

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.

El paquete crypto/x509 de Go, en versiones anteriores a la 1.10.6 y versiones 1.11.x anteriores a la 1.11.3,no limita la cantidad de trabajo realizado para cada verificación de cadenas, lo que podría permitir que los atacantes manipulen entradas patológicas que conducen a la denegación de servicio (DoS) de la CPU. Los servidores TLS de Go que aceptan certificados de clientes y clientes TLS se han visto afectados.

This update for etcd fixes the following issues. Fixed remote command execution in cmd/go. Fixed directory traversal in cmd/go. Fixed CPU denial of service in crypto/x509. Fixed improper authentication issue when RBAC and client-cert-auth is enabled. Fixed panic in decodeRecord method. Fixed improper checks in entry index. Fixed information discosure via debug function. Fixed quadratic complexity in HPACK decoding in net/http. Fixed insufficient sanitization of Host header in go net/http. Fixed DoS vulnerability in otelgrpc. Fixed prefix truncation breaking ssh channel integrity (aka Terrapin Attack) in crypto/ssh Other changes. Added hardening to systemd service. Fixed static /tmp file issue. Fixed systemd service not starting.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-09-11 CVE Reserved
  • 2018-12-14 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-12 First Exploit
  • 2025-08-28 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
  • CWE-295: Improper Certificate Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
< 1.10.6
Search vendor "Golang" for product "Go" and version " < 1.10.6"
-
Affected
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
>= 1.11.0 < 1.11.3
Search vendor "Golang" for product "Go" and version " >= 1.11.0 < 1.11.3"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
42.3
Search vendor "Opensuse" for product "Leap" and version "42.3"
-
Affected