Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2017-15042: Moderate: golang security, bug fix, and enhancement update (CESA-2018:0878)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

CentOS Linux: CVE-2017-15042: Moderate: golang security, bug fix, and enhancement update (CESA-2018:0878)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
10/05/2017
Created
08/29/2019
Added
08/28/2019
Modified
05/25/2023

Description

An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.

Solution(s)

  • centos-upgrade-golang
  • centos-upgrade-golang-bin
  • centos-upgrade-golang-docs
  • centos-upgrade-golang-misc
  • centos-upgrade-golang-src
  • centos-upgrade-golang-tests

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;