Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-30588

Опубликовано: 20 июн. 2023
Источник: redhat
CVSS3: 5.3

Описание

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:14/nodejsWill not fix
Red Hat Software Collectionsrh-nodejs14-nodejsNot affected
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:453608.08.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:453708.08.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportnodejsFixedRHSA-2023:536126.09.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:433031.07.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:433131.07.2023
Red Hat Enterprise Linux 9.0 Extended Update SupportnodejsFixedRHSA-2023:553309.10.2023

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2219838nodejs: process interuption due to invalid Public Key information in x509 certificates

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 1 года назад

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

CVSS3: 5.3
nvd
больше 1 года назад

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

CVSS3: 5.3
debian
больше 1 года назад

When an invalid public key is used to create an x509 certificate using ...

CVSS3: 5.3
github
больше 1 года назад

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.

CVSS3: 5.3
fstec
почти 2 года назад

Уязвимость функции crypto.X509Certificate() программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании

5.3 Medium

CVSS3

Уязвимость CVE-2023-30588