First published: Tue Oct 07 2014(Updated: )
crpyto/tls in Go 1.1 before 1.3.2, when SessionTicketsDisabled is enabled, allows man-in-the-middle attackers to spoof clients via unspecified vectors.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Golang | =1.1 | |
Golang | =1.1.1 | |
Golang | =1.1.2 | |
Golang | =1.2 | |
Golang | =1.2.1 | |
Golang | =1.2.2 | |
Golang | =1.3 | |
Golang | =1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7189 is considered a high severity vulnerability due to the risk of man-in-the-middle attacks.
To mitigate CVE-2014-7189, upgrade to Go versions 1.3.2 or later where the vulnerability is addressed.
CVE-2014-7189 affects Go versions 1.1 through 1.3.1 when SessionTicketsDisabled is enabled.
CVE-2014-7189 is a security vulnerability associated with TLS that allows for client spoofing.
Users and developers utilizing vulnerable versions of the Go programming language are at risk for CVE-2014-7189.