9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.018 Low
EPSS
Percentile
88.2%
Issue Overview:
As discussed upstream – http://seclists.org/oss-sec/2015/q3/294 and http://seclists.org/oss-sec/2015/q3/237 – the Go project received notification of an HTTP request smuggling vulnerability in the net/http library. Invalid headers are parsed as valid headers (like “Content Length:” with a space in the middle) and Double Content-length headers in a request does not generate a 400 error, the second Content-length is ignored.
Affected Packages:
golang, docker
Issue Correction:
Run yum update golang docker to update your system.
New Packages:
i686:
golang-pkg-bin-linux-386-1.4.2-3.16.amzn1.i686
golang-1.4.2-3.16.amzn1.i686
noarch:
golang-pkg-plan9-386-1.4.2-3.16.amzn1.noarch
golang-pkg-netbsd-arm-1.4.2-3.16.amzn1.noarch
golang-pkg-windows-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-openbsd-386-1.4.2-3.16.amzn1.noarch
golang-pkg-freebsd-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-windows-386-1.4.2-3.16.amzn1.noarch
golang-pkg-openbsd-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-darwin-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-freebsd-386-1.4.2-3.16.amzn1.noarch
golang-pkg-linux-arm-1.4.2-3.16.amzn1.noarch
golang-pkg-darwin-386-1.4.2-3.16.amzn1.noarch
golang-pkg-netbsd-386-1.4.2-3.16.amzn1.noarch
golang-pkg-linux-386-1.4.2-3.16.amzn1.noarch
golang-src-1.4.2-3.16.amzn1.noarch
golang-pkg-netbsd-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-linux-amd64-1.4.2-3.16.amzn1.noarch
golang-pkg-freebsd-arm-1.4.2-3.16.amzn1.noarch
golang-pkg-plan9-amd64-1.4.2-3.16.amzn1.noarch
src:
golang-1.4.2-3.16.amzn1.src
docker-1.6.2-1.3.amzn1.src
x86_64:
golang-1.4.2-3.16.amzn1.x86_64
golang-pkg-bin-linux-amd64-1.4.2-3.16.amzn1.x86_64
docker-1.6.2-1.3.amzn1.x86_64
docker-devel-1.6.2-1.3.amzn1.x86_64
docker-pkg-devel-1.6.2-1.3.amzn1.x86_64
Red Hat: CVE-2015-5739, CVE-2015-5740, CVE-2015-5741
Mitre: CVE-2015-5739, CVE-2015-5740, CVE-2015-5741
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.018 Low
EPSS
Percentile
88.2%