Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-15896

Опубликовано: 11 дек. 2017
Источник: debian
EPSS Низкий

Описание

Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nodejsnot-affectedpackage

EPSS

Процентиль: 29%
0.00103
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 7 лет назад

Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.

CVSS3: 5.9
redhat
больше 7 лет назад

Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.

CVSS3: 9.1
nvd
больше 7 лет назад

Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.

CVSS3: 9.1
github
около 3 лет назад

Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.

suse-cvrf
больше 7 лет назад

Security update for nodejs6

EPSS

Процентиль: 29%
0.00103
Низкий