Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: CVE-2017-15042: Security patch for golang (ALAS-2017-918)

Back to Search

Amazon Linux AMI: CVE-2017-15042: Security patch for golang (ALAS-2017-918)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
10/05/2017
Created
07/25/2018
Added
11/03/2017
Modified
09/19/2018

Description

An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.

Solution(s)

  • amazon-linux-upgrade-golang

References

  • amazon-linux-upgrade-golang

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;