Description
The Dial and LookupPort functions panic on Windows when provided with an input containing a NUL (0).
Published: 2026-05-07
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Go standard library’s net package contains a defect that causes the Dial and LookupPort functions to panic when a Windows platform receives an input string that contains a NUL (0) byte. The panic terminates the process, leading to a loss of service for the application that called the function. This issue is a classic instance of improper input validation that results in program termination, producing a denial of service condition for any process that relies on those network APIs.

Affected Systems

The vulnerability affects the Go standard library package net, which is bundled with all Go releases that include this defect. It is specific to Windows operating system environments. No explicit version range is given in the advisory, so the defect may be present in any Go version that has not yet incorporated the fix referenced in the Go issue tracker.

Risk and Exploitability

The EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog, but the defect is deterministic and will crash any code that passes an unvalidated string containing a NUL byte to Dial or LookupPort on Windows. The attack vector is likely local or remote, depending on whether the offending input originates from an external request processed by a Go application. An attacker could trigger the crash by supplying a crafted address string or port name to a service that uses these functions, causing the service to terminate and disrupting availability for legitimate users.

Generated by OpenCVE AI on May 7, 2026 at 21:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Go release that includes the fix referenced in Go issue 79006.
  • If an upgrade is not immediately available, sanitize any strings passed to Dial or LookupPort to remove NUL characters before use.
  • Monitor application logs for unexpected panics and consider implementing graceful error handling to restart services if a crash occurs.

Generated by OpenCVE AI on May 7, 2026 at 21:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Thu, 07 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description The Dial and LookupPort functions panic on Windows when provided with an input containing a NUL (0).
Title Panic in Dial and LookupPort when handling NUL byte on Windows in net
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-07T19:41:18.300Z

Reserved: 2026-04-07T18:13:03.529Z

Link: CVE-2026-39836

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T20:16:43.593

Modified: 2026-05-07T20:38:04.860

Link: CVE-2026-39836

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T21:30:25Z

Weaknesses