Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-34558

Опубликовано: 13 июл. 2021
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.

A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate's private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0–1.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.

Отчет

  • This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components:
  • OpenShift Container Platform
  • OpenShift distributed tracing (formerly OpenShift Jaeger)
  • OpenShift Migration Toolkit for Containers
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat OpenShift on AWS
  • Red Hat OpenShift Virtualization
  • Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.
  • Because Service Telemetry Framework1.2 will be retiring soon and the flaw's impact is lower, no update will be provided at this time for STF1.2's containers.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift PipelinesgolangAffected
OpenShift Serverlessknative-servingAffected
OpenShift Service Mesh 2.0golangAffected
Red Hat Advanced Cluster Management for Kubernetes 2applifecycle-backend-e2eNot affected
Red Hat Advanced Cluster Management for Kubernetes 2assisted-installerNot affected
Red Hat Advanced Cluster Management for Kubernetes 2assisted-installer-agentNot affected
Red Hat Advanced Cluster Management for Kubernetes 2assisted-serviceNot affected
Red Hat Advanced Cluster Management for Kubernetes 2cert-managerNot affected
Red Hat Advanced Cluster Management for Kubernetes 2cert-policy-controllerNot affected
Red Hat Advanced Cluster Management for Kubernetes 2cluster-curator-controllerNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1983596golang: crypto/tls: certificate of wrong type is causing TLS client to panic

EPSS

Процентиль: 74%
0.00839
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 4 лет назад

The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.

CVSS3: 6.5
nvd
около 4 лет назад

The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.

CVSS3: 6.5
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 6.5
debian
около 4 лет назад

The crypto/tls package of Go through 1.16.5 does not properly assert t ...

suse-cvrf
около 4 лет назад

Security update for go1.15

EPSS

Процентиль: 74%
0.00839
Низкий

6.5 Medium

CVSS3