Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-5737

Опубликовано: 28 фев. 2019
Источник: redhat
CVSS3: 5.3
EPSS Средний

Описание

In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.

It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server's headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.

Меры по смягчению последствий

The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Application Runtimesnodejs10Not affected
Red Hat OpenShift Application Runtimesnodejs8Not affected
Red Hat OpenShift Container Platform 3.10nodejsFix deferred
Red Hat OpenShift Container Platform 3.6nodejsFix deferred
Red Hat OpenShift Container Platform 3.7nodejsOut of support scope
Red Hat OpenShift Container Platform 3.9nodejsFix deferred
Red Hat Enterprise Linux 8nodejsFixedRHSA-2019:292530.09.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nodejs8-nodejsFixedRHSA-2019:182122.07.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nodejs10FixedRHSA-2019:293901.10.2019
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nodejs10-nodejsFixedRHSA-2019:293901.10.2019

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1690808nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass

EPSS

Процентиль: 96%
0.29342
Средний

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.

CVSS3: 7.5
nvd
около 6 лет назад

In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.

CVSS3: 7.5
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
около 6 лет назад

In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before ...

suse-cvrf
около 6 лет назад

Security update for nodejs10

EPSS

Процентиль: 96%
0.29342
Средний

5.3 Medium

CVSS3