Vulnerability Name: CVE-2021-29923 (CCN-207025) Assigned: 2021-03-22 Published: 2021-03-22 Updated: 2022-09-14 Summary: Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR. CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N )6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): HighAvailibility (A): None
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N )6.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): HighAvailibility (A): None
7.3 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )6.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): CompleteAvailibility (A): None
Vulnerability Type: CWE-noinfo CWE-20 Vulnerability Consequences: Bypass Security References: Source: MITRE Type: CNACVE-2021-29923 Source: MISC Type: Third Party Advisoryhttps://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis Source: XF Type: UNKNOWNgolang-cve202129923-sec-bypass(207025) Source: MISC Type: Exploit, Issue Tracking, Third Party Advisoryhttps://github.com/golang/go/issues/30999 Source: MISC Type: Issue Tracking, Third Party Advisoryhttps://github.com/golang/go/issues/43389 Source: CCN Type: SICK-2021-016CVE-2021-29923 golang standard library net - Improper Input Validation of octal literals in golang 1.16.2 and below standard library net results in indeterminate SSRF & RFI vulnerabilities Source: MISC Type: Exploit, Third Party Advisoryhttps://github.com/sickcodes/security/blob/master/advisories/SICK-2021-016.md Source: MISC Type: Patch, Third Party Advisoryhttps://go-review.googlesource.com/c/go/+/325829/ Source: CCN Type: Golang Web siteGo Source: MISC Type: Vendor Advisoryhttps://golang.org/pkg/net/#ParseCIDR Source: FEDORA Type: Mailing List, Third Party AdvisoryFEDORA-2022-17d004ed71 Source: GENTOO Type: Third Party AdvisoryGLSA-202208-02 Source: CCN Type: IBM Security Bulletin 6492207 (Watson Discovery)IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in Go Source: CCN Type: IBM Security Bulletin 6499711 (Cloud Pak for Integration)Operations Dashboard is vulnerable to multiple Go vulnerabilities Source: CCN Type: IBM Security Bulletin 6501839 (Cloud Pak for Integration)IBM Cloud Pak for Integration is vulnerable to multiple Go vulnerabilities Source: CCN Type: IBM Security Bulletin 6507037 (App Connect Enterprise Certified Container)IBM App Connect Enterprise Certified Container Integration Servers may be vulnerable to bypassing of access control based on IP addresses due to CVE-2021-29923 Source: CCN Type: IBM Security Bulletin 6513717 (Event Streams)IBM Event Streams affected by multiple vulnerabilities in Golang Source: CCN Type: IBM Security Bulletin 6524682 (Spectrum Protect Plus)Vulnerabilities in Redis, OpenSSH, Golang Go, and Apache Kafka may affect IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and OpenShift Source: CCN Type: IBM Security Bulletin 6525250 (Spectrum Copy Data Management)Vulnerabilities in PostgreSQL, Apache, Golang Go, and Linux Kernel affect IBM Spectrum Copy Data Management Source: CCN Type: IBM Security Bulletin 6550866 (Security Guardium)IBM Security Guardium Insights is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6565099 (Planning Analytics)IBM Planning Analytics Workspace is affected by security vulnerabilities Source: CCN Type: IBM Security Bulletin 6574463 (Cloud Private)Security Vulnerabilities affect IBM Cloud Private - Golang (CVE-2021-29923) Source: CCN Type: IBM Security Bulletin 6574545 (Watson Speech Services Cartridge for Cloud Pak for Data)A vulnerability in Golang Go affects IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data (CVE-2021-29923) Source: CCN Type: IBM Security Bulletin 6606299 (Cloud Pak for Multicloud Management)IBM Cloud Pak for Multicloud Management Monitoring has multiple vulnerabilities associated with the Go runtime (CVE-2021-29923, CVE-2021-31525, CVE-2021-33194, CVE-2021-33195, CVE-2021-33196, CVE-2021-33197, CVE-2021-33198) Source: CCN Type: IBM Security Bulletin 6615221 (Robotic Process Automation for Cloud Pak)Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak Source: CCN Type: IBM Security Bulletin 6831813 (Netcool Operations Insight)Netcool Operations Insight v1.6.6 contains fixes for multiple security vulnerabilities. Source: CCN Type: IBM Security Bulletin 6831849 (Cloud Pak for Watson AIOps)Multiple Vulnerabilities in CloudPak for Watson AIOPs Source: CCN Type: IBM Security Bulletin 6958068 (CICS TX Standard)Multiple vulnerabilities in Go may affect IBM CICS TX Standard Source: CCN Type: Oracle CPUJan2022Oracle Critical Patch Update Advisory - January 2022 Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpujan2022.html Vulnerable Configuration: Configuration 1 :cpe:/a:golang:go:*:*:*:*:*:*:*:* (Version < 1.17)Configuration 2 :cpe:/a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:* (Version < 21.1.1.1.0)Configuration 3 :cpe:/o:fedoraproject:fedora:36:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1 :cpe:/a:golang:go:1.16.0:-:*:*:*:*:*:* AND cpe:/a:ibm:planning_analytics:2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:watson_discovery:2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:2019.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.6:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:2019.4.2:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:* OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:app_connect_enterprise_certified_container:1.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:2019.4.3:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.7:*:*:*:*:*:*:* OR cpe:/a:ibm:watson_discovery:2.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.8:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_copy_data_management:2.2.13:*:*:*:*:*:*:* OR cpe:/a:ibm:cics_tx:11.1:*:*:*:standard:*:*:* OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
golang go *
oracle timesten in-memory database *
fedoraproject fedora 36
golang go 1.16.0 -
ibm planning analytics 2.0
ibm watson discovery 2.0.0
ibm spectrum protect plus 10.1.5
ibm cloud private 3.2.1 cd
ibm event streams 2019.4.1
ibm spectrum protect plus 10.1.6
ibm event streams 2019.4.2
ibm event streams 10.0.0
ibm cloud private 3.2.2 cd
ibm app connect enterprise certified container 1.0.0
ibm app connect enterprise certified container 1.0.1
ibm app connect enterprise certified container 1.0.2
ibm app connect enterprise certified container 1.0.3
ibm app connect enterprise certified container 1.0.4
ibm event streams 2019.4.3
ibm event streams 10.1.0
ibm spectrum protect plus 10.1.7
ibm watson discovery 2.2.1
ibm event streams 10.2.0
ibm spectrum protect plus 10.1.8
ibm event streams 10.3.0
ibm event streams 10.3.1
ibm spectrum copy data management 2.2.13
ibm cics tx 11.1
ibm robotic process automation for cloud pak 21.0.1
ibm robotic process automation for cloud pak 21.0.2
ibm robotic process automation for cloud pak 21.0.3