The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-07-15 14:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-34558
Mitre link : CVE-2021-34558
CVE.ORG link : CVE-2021-34558
JSON object : View
Products Affected
netapp
- cloud_insights_telegraf
- storagegrid
- trident
fedoraproject
- fedora
oracle
- timesten_in-memory_database
golang
- go
CWE
CWE-295
Improper Certificate Validation