← Voltar para CVEs
CVE-2020-8265
HIGH8.1
Descricao
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
Detalhes CVE
Pontuacao CVSS v3.18.1
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado1/6/2021
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
debian:debian_linuxfedoraproject:fedoranodejs:node.jsoracle:graalvmsiemens:sinec_infrastructure_network_services
Fraquezas (CWE)
CWE-416CWE-416
Referencias
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf(support@hackerone.com)
https://hackerone.com/reports/988103(support@hackerone.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/(support@hackerone.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/(support@hackerone.com)
https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/(support@hackerone.com)
https://security.gentoo.org/glsa/202101-07(support@hackerone.com)
https://security.netapp.com/advisory/ntap-20210212-0003/(support@hackerone.com)
https://www.debian.org/security/2021/dsa-4826(support@hackerone.com)
https://www.oracle.com/security-alerts/cpujan2021.html(support@hackerone.com)
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://hackerone.com/reports/988103(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4I6MZNC7C7VIDQR267OL4TVCI3ZKAC4/(af854a3a-2127-422b-91ae-364da2661108)
https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202101-07(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210212-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4826(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2021.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.