First published: Mon Sep 20 2021(Updated: )
Golang Go is vulnerable to a denial of service, caused by a flaw in the NewReader and OpenReader functions in archive/zip. By sending a specially-crafted archive header, a remote attacker could exploit this vulnerability to cause a panic, which results in a denial of service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.16.8 | |
Golang Go | >=1.17.0<1.17.1 | |
Netapp Cloud Insights Telegraf | ||
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39293 is a vulnerability in Go that can be exploited by a remote attacker to cause a denial of service.
CVE-2021-39293 can lead to a panic, resulting in a denial of service in Go.
Go versions up to 1.16.8 and versions up to 1.17.1 are affected by CVE-2021-39293.
To fix the CVE-2021-39293 vulnerability in Go, update to version 1.16.8 or 1.17.1.
Yes, you can find more information about CVE-2021-39293 in the references provided: [Reference 1](https://access.redhat.com/security/cve/CVE-2021-33196), [Reference 2](https://groups.google.com/g/golang-announce/c/dx9d7IOseHw), [Reference 3](https://github.com/golang/go/issues/47801).