Scientific Linux Security Update : golang on SL7.x x86_64 (httpoxy)

Medium Nessus Plugin ID 92722


The remote Scientific Linux host is missing one or more security updates.


The following packages have been upgraded to a newer upstream version:
golang (1.6.3).

Security Fix(es) :

- An input-validation flaw was discovered in the Go programming language built in CGI implementation, which set the environment variable 'HTTP_PROXY' using the incoming 'Proxy' HTTP-request header. The environment variable 'HTTP_PROXY' is used by numerous web clients, including Go's net/http package, to specify a proxy server to use for HTTP and, in some cases, HTTPS requests. This meant that when a CGI-based web application ran, an attacker could specify a proxy server which the application then used for subsequent outgoing requests, allowing a man-in- the-middle attack.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 92722

File Name: sl_20160803_golang_on_SL7_x.nasl

Version: $Revision: 2.4 $

Type: local

Agent: unix

Published: 2016/08/04

Modified: 2016/10/24

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P


Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2016/08/03

Reference Information

CVE: CVE-2016-5386