Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-3736

Опубликовано: 03 апр. 2018
Источник: redhat
CVSS3: 8.6

Описание

[REJECTED CVE] A flaw was found in https-proxy-agent, prior to version 2.2.0. It was discovered https-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.

Отчет

This flaw was found to be a duplicate of CVE-2018-3739. Please see https://access.redhat.com/security/cve/CVE-2018-3739 for information about affected products and security errata.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:10/nodejsNot affected
Red Hat Mobile Application Platform 4nodejs-https-proxy-agentNot affected
Red Hat Software Collectionsrh-nodejs10-nodejsNot affected
Red Hat Software Collectionsrh-nodejs8-nodejsNot affected

Показывать по

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=1576651nodejs-https-proxy-agent: Unsanitized options passed to Buffer() allow for denial of service

8.6 High

CVSS3

Связанные уязвимости

nvd
больше 7 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-3739. Reason: This candidate is a duplicate of CVE-2018-3739. Notes: All CVE users should reference CVE-2018-3739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage

8.6 High

CVSS3