GO-2021-0154

Source
https://pkg.go.dev/vuln/GO-2021-0154
Import Source
https://vuln.go.dev/ID/GO-2021-0154.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2021-0154
Aliases
  • CVE-2014-7189
Published
2022-05-25T21:11:41Z
Modified
2024-06-03T20:51:31Z
Summary
Man-in-the-middle attack with SessionTicketsDisabled in crypto/tls
Details

When SessionTicketsDisabled is enabled, crypto/tls allowed man-in-the-middle attackers to spoof clients via unspecified vectors.

If the server enables TLS client authentication using certificates (this is rare) and explicitly sets SessionTicketsDisabled to true in the tls.Config, then a malicious client can falsely assert ownership of any client certificate it wishes.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2021-0154"
}
References
Credits
    • Go Team

Affected packages

Go / stdlib

Package

Affected ranges

Type
SEMVER
Events
Introduced
1.1.0-0
Fixed
1.3.2

Ecosystem specific

{
    "imports": [
        {
            "path": "crypto/tls",
            "symbols": [
                "checkForResumption",
                "decryptTicket"
            ]
        }
    ]
}