CVE-2016-3959

The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
Configurations

Configuration 1 (hide)

cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:golang:go:1.6:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-05-23 19:59

Updated : 2024-02-04 18:53


NVD link : CVE-2016-3959

Mitre link : CVE-2016-3959

CVE.ORG link : CVE-2016-3959


JSON object : View

Products Affected

golang

  • go

fedoraproject

  • fedora

opensuse

  • leap
CWE
CWE-20

Improper Input Validation