blob: 30ed87dcadf408295da09bbaa50649240a6b1fa0 [file] [log] [blame]
modules:
- module: std
versions:
- introduced: 1.1.0
fixed: 1.8.4
- introduced: 1.9.0
fixed: 1.9.1
packages:
- package: net/smtp
symbols:
- plainAuth.Start
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
description: |
SMTP clients using net/smtp can use the PLAIN authentication scheme on
network connections not secured with TLS, exposing passwords to
man-in-the-middle SMTP servers.
published: 2022-01-07T20:35:00Z
cves:
- CVE-2017-15042
credit: Stevie Johnstone
references:
- fix: https://go.dev/cl/68170
- fix: https://go.googlesource.com/go/+/ec3b6131de8f9c9c25283260c95c616c74f6d790
- report: https://go.dev/issue/22134
- web: https://groups.google.com/g/golang-dev/c/RinSE3EiJBI/m/kYL7zb07AgAJ