CVE-2016-3959

The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
Configurations

Configuration 1 (hide)

cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:golang:go:1.6:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:32

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!topic/golang-announce/9eqIHqaWvck', 'name': '[golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released', 'tags': [], 'refsource': 'MLIST'}
  • () https://groups.google.com/forum/#%21topic/golang-announce/9eqIHqaWvck -

Information

Published : 2016-05-23 19:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-3959

Mitre link : CVE-2016-3959

CVE.ORG link : CVE-2016-3959


JSON object : View

Products Affected

opensuse

  • leap

golang

  • go

fedoraproject

  • fedora
CWE
CWE-20

Improper Input Validation