First published: Wed Sep 06 2023(Updated: )
Golang Go is vulnerable to a denial of service, caused by a flaw when processing partial post-handshake message in QUICConn.HandleData in the crypto/tls package. By sending a specially crafted post-handshake message for a QUIC connection, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/golang | <1.20.8 | 1.20.8 |
redhat/golang | <1.21.1 | 1.21.1 |
Ruby | >=1.21.0<1.21.1 | |
IBM Planning Analytics Cloud | <=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39321 is a vulnerability that causes a panic when processing an incomplete post-handshake message for a QUIC connection.
The severity of CVE-2023-39321 is high with a CVSS score of 7.5.
CVE-2023-39321 affects Golang Go version 1.21.0 to 1.21.1.
To fix CVE-2023-39321, update Golang Go to a version higher than 1.21.1.
You can refer to the following references for more information: [1] https://go.dev/cl/523039 [2] https://go.dev/issue/62266 [3] https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ