CVE Vulnerabilities

CVE-2017-3204

Published: Apr 04, 2017 | Modified: Apr 20, 2025
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
4.8 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.

Affected Software

NameVendorStart VersionEnd Version
CryptoGolang*2017-03-17 (including)
Golang-go.cryptoUbuntuartful*
Golang-go.cryptoUbuntuesm-infra/xenial*
Golang-go.cryptoUbuntuupstream*
Golang-go.cryptoUbuntuxenial*
Golang-go.cryptoUbuntuyakkety*
Golang-go.cryptoUbuntuzesty*
SnapdUbuntuartful*
SnapdUbuntubionic*
SnapdUbuntucosmic*
SnapdUbuntudevel*
SnapdUbuntudisco*
SnapdUbuntueoan*
SnapdUbuntuesm-infra/bionic*
SnapdUbuntuesm-infra/focal*
SnapdUbuntuesm-infra/xenial*
SnapdUbuntufocal*
SnapdUbuntugroovy*
SnapdUbuntuhirsute*
SnapdUbuntuimpish*
SnapdUbuntujammy*
SnapdUbuntukinetic*
SnapdUbuntulunar*
SnapdUbuntumantic*
SnapdUbuntunoble*
SnapdUbuntuoracular*
SnapdUbuntuplucky*
SnapdUbuntuquesting*
SnapdUbuntutrusty*
SnapdUbuntuxenial*
SnapdUbuntuyakkety*
SnapdUbuntuzesty*
Ubuntu-snappyUbuntuvivid/ubuntu-core*

References