Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-36049

Опубликовано: 08 янв. 2020
Источник: redhat
CVSS3: 7.5

Описание

socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.

An uncontrolled resource consumption vulnerability was found in socket.io-parser. If an attacker crafts a packet with a very large payload length, this can cause the parser to consume an ever-increasing amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 2systemAffected
Red Hat Quay 3quay/quay-builder-qemu-rhcos-rhel8Not affected
Red Hat Quay 3quay/quay-rhel8Fix deferred

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1918266yarnpkg-socket.io-parser: a denial of service (memory consumption) via a large packet because a concatenation approach is used

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 5 лет назад

socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.

CVSS3: 7.5
nvd
около 5 лет назад

socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.

CVSS3: 7.5
debian
около 5 лет назад

socket.io-parser before 3.4.1 allows attackers to cause a denial of se ...

CVSS3: 7.5
github
больше 4 лет назад

Resource exhaustion in socket.io-parser

7.5 High

CVSS3