Vulnerability Description
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Golang | Go | < 1.4.3 |
| Redhat | Openstack | 7.0 |
| Redhat | Enterprise Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.htMailing ListPatchThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.htMailing ListPatchThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/237Mailing ListThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/292Mailing ListThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/294Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1250352Issue TrackingPatchThird Party Advisory
- https://github.com/golang/go/commit/300d9a21583e7cf0149a778a0611e76ff7c6680fPatchThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.htMailing ListPatchThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.htMailing ListPatchThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/237Mailing ListThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/292Mailing ListThird Party Advisory
- http://seclists.org/oss-sec/2015/q3/294Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1250352Issue TrackingPatchThird Party Advisory
- https://github.com/golang/go/commit/300d9a21583e7cf0149a778a0611e76ff7c6680fPatchThird Party Advisory
FAQ
What is CVE-2015-5741?
CVE-2015-5741 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contain...
How severe is CVE-2015-5741?
CVE-2015-5741 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2015-5741?
Check the references section above for vendor advisories and patch information. Affected products include: Golang Go, Redhat Openstack, Redhat Enterprise Linux.