CVE-2018-16875
Gentoo Linux Security Advisory 201812-09
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
El paquete crypto/x509 de Go, en versiones anteriores a la 1.10.6 y versiones 1.11.x anteriores a la 1.11.3,no limita la cantidad de trabajo realizado para cada verificación de cadenas, lo que podría permitir que los atacantes manipulen entradas patológicas que conducen a la denegación de servicio (DoS) de la CPU. Los servidores TLS de Go que aceptan certificados de clientes y clientes TLS se han visto afectados.
This update for etcd fixes the following issues. Fixed remote command execution in cmd/go. Fixed directory traversal in cmd/go. Fixed CPU denial of service in crypto/x509. Fixed improper authentication issue when RBAC and client-cert-auth is enabled. Fixed panic in decodeRecord method. Fixed improper checks in entry index. Fixed information discosure via debug function. Fixed quadratic complexity in HPACK decoding in net/http. Fixed insufficient sanitization of Host header in go net/http. Fixed DoS vulnerability in otelgrpc. Fixed prefix truncation breaking ssh channel integrity (aka Terrapin Attack) in crypto/ssh Other changes. Added hardening to systemd service. Fixed static /tmp file issue. Fixed systemd service not starting.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-09-11 CVE Reserved
- 2018-12-14 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-12 First Exploit
- 2025-08-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-295: Improper Certificate Validation
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106230 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16875 | Issue Tracking | |
https://groups.google.com/forum/?pli=1#%21topic/golang-announce/Kw31K8G7Fi0 | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://github.com/alexzorin/poc-cve-2018-16875 | 2024-08-12 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.10.6 Search vendor "Golang" for product "Go" and version " < 1.10.6" | - |
Affected
| ||||||
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | >= 1.11.0 < 1.11.3 Search vendor "Golang" for product "Go" and version " >= 1.11.0 < 1.11.3" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 42.3 Search vendor "Opensuse" for product "Leap" and version "42.3" | - |
Affected
|