First published: Mon May 23 2016(Updated: )
The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =42.1 | |
Golang | =1.6 | |
Fedora | =22 | |
Fedora | =23 | |
Fedora | =24 | |
Golang | <=1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3959 has a medium severity level as it may lead to a denial of service condition.
To fix CVE-2016-3959, upgrade to Go version 1.6.1 or later.
CVE-2016-3959 affects Go versions prior to 1.6.1 and all versions before 1.5.4.
Yes, CVE-2016-3959 can be exploited remotely by sending a crafted public key.
CVE-2016-3959 impacts specific distributions such as Fedora 22, 23, 24 and openSUSE Leap 42.1.