Vulnerability Description
The net/http library in net/textproto/reader.go in Go before 1.4.3 does not properly parse HTTP header keys, which allows remote attackers to conduct HTTP request smuggling attacks via a space instead of a hyphen, as demonstrated by "Content Length" instead of "Content-Length."
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Golang | Go | <= 1.4.2 |
| Fedoraproject | Fedora | 21 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.2 |
| Redhat | Enterprise Linux Server Eus | 7.2 |
| Redhat | Enterprise Linux Server Tus | 7.2 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.htThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.htThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-1538.htmlThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/237Mailing ListThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/292Mailing ListThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/294Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/76281Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1250352Issue TrackingPatchThird Party Advisory
- https://github.com/golang/go/commit/117ddcb83d7f42d6aa72241240af99ded81118e9Issue TrackingPatchThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.htThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.htThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-1538.htmlThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/237Mailing ListThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/292Mailing ListThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/294Mailing ListThird Party Advisory
FAQ
What is CVE-2015-5739?
CVE-2015-5739 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The net/http library in net/textproto/reader.go in Go before 1.4.3 does not properly parse HTTP header keys, which allows remote attackers to conduct HTTP request smuggling attacks via a space instead...
How severe is CVE-2015-5739?
CVE-2015-5739 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2015-5739?
Check the references section above for vendor advisories and patch information. Affected products include: Golang Go, Fedoraproject Fedora, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus, Redhat Enterprise Linux Server Eus.