First published: Mon May 13 2019(Updated: )
Go through 1.12.5 on Windows mishandles process creation with a nil environment in conjunction with a non-nil token, which allows attackers to obtain sensitive information or gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang | <=1.12.5 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11888 is considered to have high severity due to its potential for sensitive information disclosure and privilege escalation.
To fix CVE-2019-11888, users should upgrade to Go versions later than 1.12.5 that contain the necessary patches.
CVE-2019-11888 affects Go versions 1.12.5 and earlier.
CVE-2019-11888 is a security vulnerability related to process creation mishandling and privilege escalation.
CVE-2019-11888 requires local access to exploit, thus it is not considered a remote vulnerability.