First published: Tue Mar 05 2024(Updated: )
Golang Go is vulnerable to a denial of service, caused by a flaw when parsing a multipart form in the net/textproto package. By sending a specially crafted input, a remote attacker could exploit this vulnerability to allocate arbitrarily large amounts of memory, and results in a denial of service condition.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Concert Software | <=1.0.0 - 1.0.1 | |
redhat/go | <1.21.8 | 1.21.8 |
redhat/go | <1.22.1 | 1.22.1 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | <=1.19.8-2 | |
debian/golang-1.22 | 1.22.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45290 has a high severity level due to its ability to cause denial of service through arbitrary memory allocation.
To fix CVE-2023-45290, update to Go version 1.21.8 or later, or 1.22.1 or later, depending on your package source.
CVE-2023-45290 affects several versions of IBM Concert Software and various versions of Go packages, including golang-1.15, golang-1.19, and golang-1.22.
An attacker exploiting CVE-2023-45290 could create a denial of service by sending specially crafted input to allocate large amounts of memory.
No, CVE-2023-45290 is not a remote code execution vulnerability; it leads to denial of service instead.