← Volver a CVEs
CVE-2020-8265
HIGH8.1
Descripcion
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
Detalles CVE
Puntuacion CVSS v3.18.1
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadHIGH
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado1/6/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
debian:debian_linuxfedoraproject:fedoranodejs:node.jsoracle:graalvmsiemens:sinec_infrastructure_network_services
Debilidades (CWE)
CWE-416CWE-416
Referencias
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf(support@hackerone.com)
https://hackerone.com/reports/988103(support@hackerone.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/(support@hackerone.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/(support@hackerone.com)
https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/(support@hackerone.com)
https://security.gentoo.org/glsa/202101-07(support@hackerone.com)
https://security.netapp.com/advisory/ntap-20210212-0003/(support@hackerone.com)
https://www.debian.org/security/2021/dsa-4826(support@hackerone.com)
https://www.oracle.com/security-alerts/cpujan2021.html(support@hackerone.com)
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://hackerone.com/reports/988103(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/(af854a3a-2127-422b-91ae-364da2661108)
https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202101-07(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210212-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4826(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2021.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.