Описание
Denial-of-Service Memory Exhaustion in qs
Versions prior to 1.0 of qs
are affected by a denial of service condition. This condition is triggered by parsing a crafted string that deserializes into very large sparse arrays, resulting in the process running out of memory and eventually crashing.
Recommendation
Update to version 1.0.0 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-7191
- https://github.com/visionmedia/node-querystring/issues/104
- https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8
- https://access.redhat.com/errata/RHSA-2016:1380
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96729
- https://github.com/advisories/GHSA-jjv7-qpx3-h62q
- https://www.npmjs.com/advisories/29
- http://secunia.com/advisories/60026
- http://secunia.com/advisories/62170
- http://www-01.ibm.com/support/docview.wss?uid=swg21685987
- http://www-01.ibm.com/support/docview.wss?uid=swg21687263
- http://www-01.ibm.com/support/docview.wss?uid=swg21687928
Пакеты
qs
< 1.0.0
1.0.0
Связанные уязвимости
The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.
The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.
The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.
The qs module before 1.0.0 in Node.js does not call the compact functi ...