[GO-2023-2402] Man-in-the-middle attacker can compromise integrity of secure channel in golang.org/x/crypto

Severity Medium
Affected Packages 1
Fixed Packages 1
CVEs 1

A protocol weakness allows a MITM attacker to compromise the integrity of the
secure channel before it is established, allowing the attacker to prevent
transmission of a number of messages immediately after the secure channel is
established without either side being aware.

The impact of this attack is relatively limited, as it does not compromise
confidentiality of the channel. Notably this attack would allow an attacker to
prevent the transmission of the SSH2_MSG_EXT_INFO message, disabling a handful
of newer security features.

This protocol weakness was also fixed in OpenSSH 9.6.

Package Affected Version
pkg:golang/golang.org/x/crypto/ssh >= 0.16.0, < 0.17.0
Package Fixed Version
pkg:golang/golang.org/x/crypto/ssh = 0.17.0
ID
GO-2023-2402
Severity
medium
Severity from
CVE-2023-48795
URL
https://pkg.go.dev/vuln/GO-2023-2402
Published
2023-12-18T18:34:01
(9 months ago)
Modified
2024-05-14T19:19:00
(4 months ago)
Other Advisories
Source # ID Name URL
Security Advisory https://github.com/advisories/GHSA-45x7-px36-x8w8
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Fixed pkg:golang/golang.org/x/crypto/ssh golang.org/x/crypto ssh = 0.17.0
Affected pkg:golang/golang.org/x/crypto/ssh golang.org/x/crypto ssh >= 0.16.0 < 0.17.0
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...