Описание
All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 8 | nodejs | Not affected | ||
Red Hat Mobile Application Platform 4 | nodejs | Not affected | ||
Red Hat OpenShift Application Runtimes | nodejs | Not affected | ||
Red Hat OpenShift Container Platform 3.10 | logging-auth-proxy | Not affected | ||
Red Hat OpenShift Container Platform 3.10 | logging-kibana | Not affected | ||
Red Hat Software Collections | rh-nodejs4-nodejs | Not affected | ||
Red Hat Software Collections | rh-nodejs6-nodejs | Not affected | ||
Red Hat Software Collections | rh-nodejs8-nodejs | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation.
All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation.
All versions of Node.js 9.x and 10.x are vulnerable and the severity i ...
All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation.
EPSS
7.5 High
CVSS3