Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title rh-nodejs4-nodejs and rh-nodejs4-http-parser security update
Informations
Name RHSA-2017:0002 First vendor Publication 2017-01-02
Vendor RedHat Last vendor Modification 2017-01-02
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

An update for rh-nodejs4-nodejs and rh-nodejs4-http-parser is now available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64

3. Description:

Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices.

The following packages have been upgraded to a newer upstream version: rh-nodejs4-nodejs (4.6.2), rh-nodejs4-http-parser (2.7.0). (BZ#1388097)

Security Fix(es):

* It was found that Node.js' tls.checkServerIdentity() function did not properly validate server certificates containing wildcards. A malicious TLS server could use this flaw to get a specially crafted certificate accepted by a Node.js TLS client. (CVE-2016-7099)

* It was found that the V8 Zone class was vulnerable to integer overflow when allocating new memory (Zone::New() and Zone::NewExpand()). An attacker with the ability to manipulate a large zone could crash the application or, potentially, execute arbitrary code with the application privileges. (CVE-2016-1669)

* A vulnerability was found in c-ares, a DNS resolver library bundled with Node.js. A hostname with an escaped trailing dot would have its size calculated incorrectly, leading to a single byte written beyond the end of a buffer on the heap. An attacker able to provide such a hostname to an application using c-ares, could potentially cause that application to crash. (CVE-2016-5180)

* It was found that the reason argument in ServerResponse#writeHead() was not properly validated. A remote attacker could possibly use this flaw to conduct an HTTP response splitting attack via a specially-crafted HTTP request. (CVE-2016-5325)

4. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1335449 - CVE-2016-1669 V8: integer overflow leading to buffer overflow in Zone::New 1346910 - CVE-2016-5325 nodejs: reason argument in ServerResponse#writeHead() not properly validated 1379921 - CVE-2016-7099 nodejs: wildcard certificates not properly validated 1380463 - CVE-2016-5180 c-ares: Single byte out of buffer write 1388097 - Rebase nodejs to latest v4 release

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2017-0002.html

CWE : Common Weakness Enumeration

% Id Name
25 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)
25 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
25 % CWE-113 Failure to Sanitize CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
25 % CWE-19 Data Handling

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 24
Application 3945
Application 333
Application 151
Os 5
Os 1
Os 3
Os 1
Os 1

Nessus® Vulnerability Scanner

Date Description
2017-01-12 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201701-28.nasl - Type : ACT_GATHER_INFO
2017-01-10 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-58.nasl - Type : ACT_GATHER_INFO
2017-01-03 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-3287-1.nasl - Type : ACT_GATHER_INFO
2017-01-03 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-3286-1.nasl - Type : ACT_GATHER_INFO
2016-12-14 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201612-43.nasl - Type : ACT_GATHER_INFO
2016-12-06 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1403.nasl - Type : ACT_GATHER_INFO
2016-12-02 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1373.nasl - Type : ACT_GATHER_INFO
2016-12-01 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-3143-1.nasl - Type : ACT_GATHER_INFO
2016-11-17 Name : An IDE application installed on the remote macOS or Mac OS X host is affected...
File : macosx_xcode_81.nasl - Type : ACT_GATHER_INFO
2016-11-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-e523c37b4d.nasl - Type : ACT_GATHER_INFO
2016-11-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-4f34f26649.nasl - Type : ACT_GATHER_INFO
2016-11-15 Name : The remote Fedora host is missing a security update.
File : fedora_2016-43ff70c6b1.nasl - Type : ACT_GATHER_INFO
2016-11-10 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1277.nasl - Type : ACT_GATHER_INFO
2016-10-31 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_28bb6ee59b5c11e6b79919bef72f4b7c.nasl - Type : ACT_GATHER_INFO
2016-10-31 Name : The remote Fedora host is missing a security update.
File : fedora_2016-7a3a0f0198.nasl - Type : ACT_GATHER_INFO
2016-10-12 Name : The remote Fedora host is missing a security update.
File : fedora_2016-7aa3c89e7b.nasl - Type : ACT_GATHER_INFO
2016-10-12 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1172.nasl - Type : ACT_GATHER_INFO
2016-10-12 Name : The remote Fedora host is missing a security update.
File : fedora_2016-861b8c46b7.nasl - Type : ACT_GATHER_INFO
2016-10-10 Name : The remote Fedora host is missing a security update.
File : fedora_2016-a7f9e86df7.nasl - Type : ACT_GATHER_INFO
2016-10-10 Name : The remote Fedora host is missing a security update.
File : fedora_2016-66d9389548.nasl - Type : ACT_GATHER_INFO
2016-10-07 Name : The remote Debian host is missing a security update.
File : debian_DLA-648.nasl - Type : ACT_GATHER_INFO
2016-10-06 Name : The remote Fedora host is missing a security update.
File : fedora_2016-1cc00cde2d.nasl - Type : ACT_GATHER_INFO
2016-10-04 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3682.nasl - Type : ACT_GATHER_INFO
2016-08-10 Name : The remote Fedora host is missing a security update.
File : fedora_2016-6fd3131c03.nasl - Type : ACT_GATHER_INFO
2016-08-09 Name : The remote Fedora host is missing a security update.
File : fedora_2016-e720bc8451.nasl - Type : ACT_GATHER_INFO
2016-07-21 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-884.nasl - Type : ACT_GATHER_INFO
2016-06-27 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-756.nasl - Type : ACT_GATHER_INFO
2016-06-02 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3590.nasl - Type : ACT_GATHER_INFO
2016-05-31 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_4dfafa1624ba11e6bd313065ec8fd3ec.nasl - Type : ACT_GATHER_INFO
2016-05-19 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2960-1.nasl - Type : ACT_GATHER_INFO
2016-05-17 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-584.nasl - Type : ACT_GATHER_INFO
2016-05-17 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201605-02.nasl - Type : ACT_GATHER_INFO
2016-05-16 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2016-1080.nasl - Type : ACT_GATHER_INFO
2016-05-13 Name : A web browser installed on the remote Windows host is affected by multiple vu...
File : google_chrome_50_0_2661_102.nasl - Type : ACT_GATHER_INFO
2016-05-13 Name : A web browser installed on the remote Mac OS X host is affected by multiple v...
File : macosx_google_chrome_50_0_2661_102.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2017-01-02 21:24:00
  • First insertion