Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12115

Опубликовано: 11 авг. 2018
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names 'ucs2', 'ucs-2', 'utf16le' and 'utf-16le'), Buffer#write() can be abused to write outside of the bounds of a single Buffer. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.

Отчет

Openshift Container Platform 3.x versions are potentially vulnerable via the jenkins-slave-nodejs and jenkins-agent-nodejs containers. However a build would have to occur with a malicious jenkins pipeline, or nodejs source code supplied by an attacker, reducing the impact of this flaw to moderate. Both container images used nodejs delivered from Red Hat Software Collections.

Меры по смягчению последствий

On Openshift Container Platform 3.x you can override the container image used on the Jenkins Slave by specifying the JENKINS_SLAVE_IMAGE environment variable in your jenkins deployment configuration. Ref: https://github.com/openshift/jenkins/blob/8e1ab16fb5f44d6570018c5dfa3407692fdba6e5/2/contrib/jenkins/kube-slave-common.sh#L27-L33

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:10/nodejsNot affected
Red Hat Mobile Application Platform 4nodejsWill not fix
Red Hat OpenShift Container Platform 3.10logging-auth-proxyNot affected
Red Hat OpenShift Container Platform 3.10logging-kibanaNot affected
Red Hat OpenShift Container Platform 3.11logging-auth-proxyNot affected
Red Hat OpenShift Container Platform 3.11logging-kibanaNot affected
Red Hat OpenShift Container Platform 3.2logging-auth-proxyNot affected
Red Hat OpenShift Container Platform 3.2logging-kibanaNot affected
Red Hat OpenShift Container Platform 3.3logging-auth-proxyNot affected
Red Hat OpenShift Container Platform 3.3logging-kibanaNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1620219nodejs: Out of bounds (OOB) write via UCS-2 encoding

EPSS

Процентиль: 75%
0.0096
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.

CVSS3: 7.5
nvd
почти 7 лет назад

In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.

CVSS3: 7.5
debian
почти 7 лет назад

In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when use ...

CVSS3: 7.5
github
около 3 лет назад

In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.

suse-cvrf
почти 7 лет назад

Security update for nodejs8

EPSS

Процентиль: 75%
0.0096
Низкий

8.1 High

CVSS3