VYPR
High severity7.5NVD Advisory· Published May 23, 2016· Updated May 6, 2026

CVE-2016-3959

CVE-2016-3959

Description

The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.

Affected products

6
  • Golang/Go2 versions
    cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*range: <=1.5
    • cpe:2.3:a:golang:go:1.6:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
    • cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
    • cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.