Executive Summary

Informations
NameCVE-2017-11499First vendor Publication2017-07-25
VendorCveLast vendor Modification2017-12-06

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11499

CWE : Common Weakness Enumeration

%idName
100 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application100

Nessus® Vulnerability Scanner

DateDescription
2017-08-18Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-948.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/99959
CONFIRM https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/
REDHAT https://access.redhat.com/errata/RHSA-2017:2908
https://access.redhat.com/errata/RHSA-2017:3002

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
DateInformations
2017-12-07 09:21:27
  • Multiple Updates
2017-12-02 09:21:45
  • Multiple Updates
2017-08-19 13:24:47
  • Multiple Updates
2017-08-01 00:21:30
  • Multiple Updates
2017-07-30 12:02:32
  • Multiple Updates
2017-07-25 17:21:21
  • First insertion