Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in golang.org/x/crypto: CVE-2023-48795 #2402

Closed
tatianab opened this issue Dec 12, 2023 · 1 comment
Closed

x/vulndb: potential Go vuln in golang.org/x/crypto: CVE-2023-48795 #2402

tatianab opened this issue Dec 12, 2023 · 1 comment
Assignees

Comments

@tatianab
Copy link
Contributor

tatianab commented Dec 12, 2023

Version v0.17.0 of golang.org/x/crypto fixes a protocol weakness in the golang.org/x/crypto/ssh package that allowed a MITM attacker to compromise the integrity of the secure channel before it was established, allowing them to prevent transmission of a number of messages immediately after the secure channel was established without either side being aware.

The impact of this attack is relatively limited, as it does not compromise confidentiality of the channel. Notably this attack would allow an attacker to prevent the transmission of the SSH2_MSG_EXT_INFO message, disabling a handful of newer security features.

This protocol weakness was also fixed in OpenSSH 9.6.

Thanks to Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk from Ruhr University Bochum for reporting this issue.

This is CVE-2023-48795 and Go issue https://go.dev/issue/64784.

@tatianab tatianab self-assigned this Dec 12, 2023
@tatianab tatianab changed the title x/vulndb: potential Go vuln: CVE-2023-48795 x/vulndb: potential Go vuln in golang.org/x/crypto: CVE-2023-48795 Dec 18, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/550858 mentions this issue: data/reports: add GO-2023-2402.yaml

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants