Описание
The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.6.17~dfsg1-1ubuntu1 |
| esm-apps/xenial | not-affected | 0.6.17~dfsg1-1ubuntu1 |
| esm-infra-legacy/trusty | not-affected | 0.6.17~dfsg1-1ubuntu1 |
| hardy | DNE | |
| lucid | DNE | |
| natty | ignored | end of life |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | not-affected | 0.6.17~dfsg1-1ubuntu1 |
Показывать по
EPSS
6.4 Medium
CVSS2
Связанные уязвимости
The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.
The Update method in src/node_http_parser.cc in Node.js before 0.6.17 ...
The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.
EPSS
6.4 Medium
CVSS2