Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2023-29406 CVE-2023-29409 CVE-2023-39319 CVE-2023-39321 CVE-2023-39322 CVE-2023-39323 |
CWE-ID | CWE-644 CWE-295 CWE-79 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Anolis OS Operating systems & Components / Operating system golang-tests Operating systems & Components / Operating system package or component golang-src Operating systems & Components / Operating system package or component golang-misc Operating systems & Components / Operating system package or component golang-docs Operating systems & Components / Operating system package or component golang-shared Operating systems & Components / Operating system package or component golang-bin Operating systems & Components / Operating system package or component golang Operating systems & Components / Operating system package or component |
Vendor | OpenAnolis |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU78327
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-29406
CWE-ID:
CWE-644 - Improper Neutralization of HTTP Headers for Scripting Syntax
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to improper input validation in HTTP/1 client when handling HTTP Host header. A remote non-authenticated attacker can send a specially crafted HTTP request with a maliciously crafted Host header and inject additional headers or entire requests.
Successful exploitation of the vulnerability may allow an attacker to perform cross-site scripting, cache poisoning or session hijacking attacks.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 23
golang-tests: before 1.20.9-1
golang-src: before 1.20.9-1
golang-misc: before 1.20.9-1
golang-docs: before 1.20.9-1
golang-shared: before 1.20.9-1
golang-bin: before 1.20.9-1
golang: before 1.20.9-1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2023:0588
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78913
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-29409
CWE-ID:
CWE-295 - Improper Certificate Validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to verifying certificate chains containing large RSA keys is slow. A remote attacker can cause a client/server to expend significant CPU time verifying signatures.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 23
golang-tests: before 1.20.9-1
golang-src: before 1.20.9-1
golang-misc: before 1.20.9-1
golang-docs: before 1.20.9-1
golang-shared: before 1.20.9-1
golang-bin: before 1.20.9-1
golang: before 1.20.9-1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2023:0588
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80573
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39319
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists within the html/template package caused by improperly applied rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. A remote attacker can pass specially crafted input to the application and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 23
golang-tests: before 1.20.9-1
golang-src: before 1.20.9-1
golang-misc: before 1.20.9-1
golang-docs: before 1.20.9-1
golang-shared: before 1.20.9-1
golang-bin: before 1.20.9-1
golang: before 1.20.9-1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2023:0588
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80574
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39321
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in crypto/tls when processing post-handshake message on QUIC connections. A remote attacker can send an incomplete post-handshake message for a QUIC connection and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 23
golang-tests: before 1.20.9-1
golang-src: before 1.20.9-1
golang-misc: before 1.20.9-1
golang-docs: before 1.20.9-1
golang-shared: before 1.20.9-1
golang-bin: before 1.20.9-1
golang: before 1.20.9-1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2023:0588
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80575
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39322
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in crypto/tls when processing post-handshake message on QUIC connections. A remote attacker can send an incomplete post-handshake message for a QUIC connection and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 23
golang-tests: before 1.20.9-1
golang-src: before 1.20.9-1
golang-misc: before 1.20.9-1
golang-docs: before 1.20.9-1
golang-shared: before 1.20.9-1
golang-bin: before 1.20.9-1
golang: before 1.20.9-1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2023:0588
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81964
Risk: Medium
CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39323
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient validation of user-supplied input when processing line directives (e.g. "//line") in the code. A remote attacker can bypass restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build".
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 23
golang-tests: before 1.20.9-1
golang-src: before 1.20.9-1
golang-misc: before 1.20.9-1
golang-docs: before 1.20.9-1
golang-shared: before 1.20.9-1
golang-bin: before 1.20.9-1
golang: before 1.20.9-1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2023:0588
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.