Executive Summary
Summary | |
---|---|
Title | rh-nodejs4-nodejs and rh-nodejs4-http-parser security update |
Informations | |||
---|---|---|---|
Name | RHSA-2017:0002 | First vendor Publication | 2017-01-02 |
Vendor | RedHat | Last vendor Modification | 2017-01-02 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for rh-nodejs4-nodejs and rh-nodejs4-http-parser is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 3. Description: Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices. The following packages have been upgraded to a newer upstream version: rh-nodejs4-nodejs (4.6.2), rh-nodejs4-http-parser (2.7.0). (BZ#1388097) Security Fix(es): * It was found that Node.js' tls.checkServerIdentity() function did not properly validate server certificates containing wildcards. A malicious TLS server could use this flaw to get a specially crafted certificate accepted by a Node.js TLS client. (CVE-2016-7099) * It was found that the V8 Zone class was vulnerable to integer overflow when allocating new memory (Zone::New() and Zone::NewExpand()). An attacker with the ability to manipulate a large zone could crash the application or, potentially, execute arbitrary code with the application privileges. (CVE-2016-1669) * A vulnerability was found in c-ares, a DNS resolver library bundled with Node.js. A hostname with an escaped trailing dot would have its size calculated incorrectly, leading to a single byte written beyond the end of a buffer on the heap. An attacker able to provide such a hostname to an application using c-ares, could potentially cause that application to crash. (CVE-2016-5180) * It was found that the reason argument in ServerResponse#writeHead() was not properly validated. A remote attacker could possibly use this flaw to conduct an HTTP response splitting attack via a specially-crafted HTTP request. (CVE-2016-5325) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1335449 - CVE-2016-1669 V8: integer overflow leading to buffer overflow in Zone::New 1346910 - CVE-2016-5325 nodejs: reason argument in ServerResponse#writeHead() not properly validated 1379921 - CVE-2016-7099 nodejs: wildcard certificates not properly validated 1380463 - CVE-2016-5180 c-ares: Single byte out of buffer write 1388097 - Rebase nodejs to latest v4 release |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2017-0002.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
25 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
25 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
25 % | CWE-113 | Failure to Sanitize CRLF Sequences in HTTP Headers ('HTTP Response Splitting') |
25 % | CWE-19 | Data Handling |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-01-12 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201701-28.nasl - Type : ACT_GATHER_INFO |
2017-01-10 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-58.nasl - Type : ACT_GATHER_INFO |
2017-01-03 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-3287-1.nasl - Type : ACT_GATHER_INFO |
2017-01-03 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-3286-1.nasl - Type : ACT_GATHER_INFO |
2016-12-14 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201612-43.nasl - Type : ACT_GATHER_INFO |
2016-12-06 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1403.nasl - Type : ACT_GATHER_INFO |
2016-12-02 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1373.nasl - Type : ACT_GATHER_INFO |
2016-12-01 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3143-1.nasl - Type : ACT_GATHER_INFO |
2016-11-17 | Name : An IDE application installed on the remote macOS or Mac OS X host is affected... File : macosx_xcode_81.nasl - Type : ACT_GATHER_INFO |
2016-11-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-e523c37b4d.nasl - Type : ACT_GATHER_INFO |
2016-11-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-4f34f26649.nasl - Type : ACT_GATHER_INFO |
2016-11-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-43ff70c6b1.nasl - Type : ACT_GATHER_INFO |
2016-11-10 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1277.nasl - Type : ACT_GATHER_INFO |
2016-10-31 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_28bb6ee59b5c11e6b79919bef72f4b7c.nasl - Type : ACT_GATHER_INFO |
2016-10-31 | Name : The remote Fedora host is missing a security update. File : fedora_2016-7a3a0f0198.nasl - Type : ACT_GATHER_INFO |
2016-10-12 | Name : The remote Fedora host is missing a security update. File : fedora_2016-7aa3c89e7b.nasl - Type : ACT_GATHER_INFO |
2016-10-12 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1172.nasl - Type : ACT_GATHER_INFO |
2016-10-12 | Name : The remote Fedora host is missing a security update. File : fedora_2016-861b8c46b7.nasl - Type : ACT_GATHER_INFO |
2016-10-10 | Name : The remote Fedora host is missing a security update. File : fedora_2016-a7f9e86df7.nasl - Type : ACT_GATHER_INFO |
2016-10-10 | Name : The remote Fedora host is missing a security update. File : fedora_2016-66d9389548.nasl - Type : ACT_GATHER_INFO |
2016-10-07 | Name : The remote Debian host is missing a security update. File : debian_DLA-648.nasl - Type : ACT_GATHER_INFO |
2016-10-06 | Name : The remote Fedora host is missing a security update. File : fedora_2016-1cc00cde2d.nasl - Type : ACT_GATHER_INFO |
2016-10-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3682.nasl - Type : ACT_GATHER_INFO |
2016-08-10 | Name : The remote Fedora host is missing a security update. File : fedora_2016-6fd3131c03.nasl - Type : ACT_GATHER_INFO |
2016-08-09 | Name : The remote Fedora host is missing a security update. File : fedora_2016-e720bc8451.nasl - Type : ACT_GATHER_INFO |
2016-07-21 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-884.nasl - Type : ACT_GATHER_INFO |
2016-06-27 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-756.nasl - Type : ACT_GATHER_INFO |
2016-06-02 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3590.nasl - Type : ACT_GATHER_INFO |
2016-05-31 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_4dfafa1624ba11e6bd313065ec8fd3ec.nasl - Type : ACT_GATHER_INFO |
2016-05-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2960-1.nasl - Type : ACT_GATHER_INFO |
2016-05-17 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-584.nasl - Type : ACT_GATHER_INFO |
2016-05-17 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201605-02.nasl - Type : ACT_GATHER_INFO |
2016-05-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-1080.nasl - Type : ACT_GATHER_INFO |
2016-05-13 | Name : A web browser installed on the remote Windows host is affected by multiple vu... File : google_chrome_50_0_2661_102.nasl - Type : ACT_GATHER_INFO |
2016-05-13 | Name : A web browser installed on the remote Mac OS X host is affected by multiple v... File : macosx_google_chrome_50_0_2661_102.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-01-02 21:24:00 |
|