CVE-2020-9283

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client.

References

http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html

https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY

https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html

https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html

https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html

Details

Source: MITRE

Published: 2020-02-20

Updated: 2020-11-18

Type: CWE-347

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (4 total)

IDNameProductFamilySeverity
143109Debian DLA-2455-1 : packer security updateNessusDebian Local Security Checks
high
142936Debian DLA-2453-1 : restic security updateNessusDebian Local Security Checks
high
141271Debian DLA-2402-1 : golang-go.crypto security updateNessusDebian Local Security Checks
medium
139385RHEL 7 / 8 : Red Hat OpenShift Service Mesh (RHSA-2020:3369)NessusRed Hat Local Security Checks
high