Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI 2: CVE-2017-15042: Security patch for golang (ALAS-2018-1011)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Amazon Linux AMI 2: CVE-2017-15042: Security patch for golang (ALAS-2018-1011)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
10/05/2017
Created
05/08/2020
Added
04/27/2020
Modified
09/30/2022

Description

An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.

Solution(s)

  • amazon-linux-ami-2-upgrade-golang
  • amazon-linux-ami-2-upgrade-golang-bin
  • amazon-linux-ami-2-upgrade-golang-docs
  • amazon-linux-ami-2-upgrade-golang-misc
  • amazon-linux-ami-2-upgrade-golang-src
  • amazon-linux-ami-2-upgrade-golang-tests

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;