Executive Summary
Summary | |
---|---|
Title | rh-nodejs8-nodejs security update |
Informations | |||
---|---|---|---|
Name | RHSA-2019:1821 | First vendor Publication | 2019-07-22 |
Vendor | RedHat | Last vendor Modification | 2019-07-22 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64le, s390x, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.16.0). (BZ#1665986, BZ#1710734) Security Fix(es): * nodejs-tar: Arbitrary file overwrites when extracting tarballs containing a hard-link (CVE-2018-20834) * nodejs: HTTP request splitting (CVE-2018-12116) * nodejs: Denial of Service with large HTTP headers (CVE-2018-12121) * nodejs: Slowloris HTTP Denial of Service (CVE-2018-12122) * nodejs: Hostname spoofing in URL parser for javascript protocol (CVE-2018-12123) * nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass (CVE-2019-5737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1660998 - CVE-2018-12116 nodejs: HTTP request splitting 1661002 - CVE-2018-12121 nodejs: Denial of Service with large HTTP headers 1661005 - CVE-2018-12122 nodejs: Slowloris HTTP Denial of Service 1661010 - CVE-2018-12123 nodejs: Hostname spoofing in URL parser for javascript protocol 1690808 - CVE-2019-5737 nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass 1702338 - CVE-2018-20834 nodejs-tar: Arbitrary file overwrites when extracting tarballs containing a hard-link |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2019-1821.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
20 % | CWE-770 | Allocation of Resources Without Limits or Throttling |
20 % | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
20 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-12-28 | Name : Node.js - JavaScript run-time environment is affected by multiple vulnerabili... File : nodejs_2018_nov.nasl - Type : ACT_GATHER_INFO |
2018-12-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_2a86f45afc3c11e8a41400155d006b02.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-03-19 13:18:42 |
|