Lucene search

K
f5F5F5:K000137093
HistoryOct 02, 2023 - 12:00 a.m.

K000137093 : Node.js vulnerabilities CVE-2018-7167, CVE-2018-12115, and CVE-2018-12116

2023-10-0200:00:00
my.f5.com
7
node.js
vulnerabilities
buffer.fill
buffer.alloc
buffer#write
http request splitting
dos
javascript

7.5 High

AI Score

Confidence

Low

0.016 Low

EPSS

Percentile

87.7%

Security Advisory Description

Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS “Boron”), 8.x (LTS “Carbon”), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.

In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names 'ucs2', 'ucs-2', 'utf16le' and 'utf-16le'), Buffer#write() can be abused to write outside of the bounds of a single Buffer. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.

Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the path option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.

Impact

An attacker may be able to cause a denial-of-service (DoS) or execute arbitrary JavaScript.