| { |
| "id": "GO-2021-0154", |
| "published": "2022-05-25T21:11:41Z", |
| "modified": "0001-01-01T00:00:00Z", |
| "aliases": [ |
| "CVE-2014-7189" |
| ], |
| "details": "When SessionTicketsDisabled is enabled, crypto/tls allowed man-in-the-middle\nattackers to spoof clients via unspecified vectors.\n\nIf the server enables TLS client authentication using certificates (this is\nrare) and explicitly sets SessionTicketsDisabled to true in the tls.Config,\nthen a malicious client can falsely assert ownership of any client\ncertificate it wishes.\n", |
| "affected": [ |
| { |
| "package": { |
| "name": "stdlib", |
| "ecosystem": "Go" |
| }, |
| "ranges": [ |
| { |
| "type": "SEMVER", |
| "events": [ |
| { |
| "introduced": "1.1.0" |
| }, |
| { |
| "fixed": "1.3.2" |
| } |
| ] |
| } |
| ], |
| "database_specific": { |
| "url": "https://pkg.go.dev/vuln/GO-2021-0154" |
| }, |
| "ecosystem_specific": { |
| "imports": [ |
| { |
| "path": "crypto/tls", |
| "symbols": [ |
| "checkForResumption", |
| "decryptTicket" |
| ] |
| } |
| ] |
| } |
| } |
| ], |
| "references": [ |
| { |
| "type": "FIX", |
| "url": "https://go.dev/cl/148080043" |
| }, |
| { |
| "type": "FIX", |
| "url": "https://go.googlesource.com/go/+/commit/64df53ed7f" |
| }, |
| { |
| "type": "REPORT", |
| "url": "https://go.dev/issue/53085" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://groups.google.com/g/golang-nuts/c/eeOHNw_shwU/m/OHALUmroA5kJ" |
| } |
| ] |
| } |