Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-1000381 (GCVE-0-2017-1000381)
Vulnerability from cvelistv5 – Published: 2017-07-07 17:00 – Updated: 2024-08-05 22:00- n/a
| URL | Tags |
|---|---|
| https://c-ares.haxx.se/0616.patch | x_refsource_CONFIRM |
| http://www.securityfocus.com/bid/99148 | vdb-entryx_refsource_BID |
| https://c-ares.haxx.se/adv_20170620.html | x_refsource_CONFIRM |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T22:00:40.967Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://c-ares.haxx.se/0616.patch"
},
{
"name": "99148",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/99148"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://c-ares.haxx.se/adv_20170620.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-06-20T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T09:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://c-ares.haxx.se/0616.patch"
},
{
"name": "99148",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/99148"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://c-ares.haxx.se/adv_20170620.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000381",
"REQUESTER": "daniel@haxx.se",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://c-ares.haxx.se/0616.patch",
"refsource": "CONFIRM",
"url": "https://c-ares.haxx.se/0616.patch"
},
{
"name": "99148",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99148"
},
{
"name": "https://c-ares.haxx.se/adv_20170620.html",
"refsource": "CONFIRM",
"url": "https://c-ares.haxx.se/adv_20170620.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-1000381",
"datePublished": "2017-07-07T17:00:00.000Z",
"dateReserved": "2017-07-07T00:00:00.000Z",
"dateUpdated": "2024-08-05T22:00:40.967Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-1000381",
"date": "2026-05-20",
"epss": "0.00568",
"percentile": "0.68744"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:c-ares:c-ares:1.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7BDB0FC-AA36-4C41-B3DC-201F0DE0191A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:c-ares:c-ares:1.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B38F8E2-7710-4303-A80F-9009619BEC7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:c-ares:c-ares:1.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA1637EF-3393-4770-91AE-89EA53D57830\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:c-ares:c-ares:1.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93FA2559-0DB1-49BE-A6E6-C73408F4AB57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:c-ares:c-ares:1.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B92EADF5-3500-4F37-808E-41DC48DE8D68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:c-ares_project:c-ares:1.11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8F4F4BD-4316-4CB2-8FCE-9EE5C59E64EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:c-ares_project:c-ares:1.11.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"476034B6-69BF-4130-8139-D5DDC1EB0028\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"4.0.0\", \"versionEndIncluding\": \"4.1.2\", \"matchCriteriaId\": \"A47FC4F7-1F77-4314-B4B3-3C5D8E335379\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"4.2.0\", \"versionEndExcluding\": \"4.8.4\", \"matchCriteriaId\": \"AC1070A7-E3E0-423C-A73A-040FCED8AD96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"5.0.0\", \"versionEndIncluding\": \"5.12.0\", \"matchCriteriaId\": \"121E5D5D-B4D9-43F3-B5C9-74590192FAF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"6.0.0\", \"versionEndIncluding\": \"6.8.1\", \"matchCriteriaId\": \"D107EC29-67E7-40C3-8E5A-324C9105C5E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\", \"versionStartIncluding\": \"6.9.0\", \"versionEndExcluding\": \"6.11.1\", \"matchCriteriaId\": \"6EA3B1B4-3576-4508-AC77-4AE3A5622E09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"7.0.0\", \"versionEndExcluding\": \"7.10.1\", \"matchCriteriaId\": \"B9C02D94-B713-4BE4-8C26-F21C2ADC01B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"8.0.0\", \"versionEndExcluding\": \"8.1.4\", \"matchCriteriaId\": \"02C6E585-2704-4EC2-BED1-CF6D61BE9CC9\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n \\\"ares_parse_naptr_reply()\\\" de c-ares, que es usada para analizar las respuestas NAPTR, podr\\u00eda ser activada para leer la memoria fuera del b\\u00fafer de entrada dado si el pasado en el paquete de respuesta DNS fue creado de una manera particular.\"}]",
"id": "CVE-2017-1000381",
"lastModified": "2024-11-21T03:04:36.013",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-07-07T17:29:00.307",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/99148\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://c-ares.haxx.se/0616.patch\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://c-ares.haxx.se/adv_20170620.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/99148\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://c-ares.haxx.se/0616.patch\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://c-ares.haxx.se/adv_20170620.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-1000381\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-07-07T17:29:00.307\",\"lastModified\":\"2026-05-13T00:24:29.033\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n \\\"ares_parse_naptr_reply()\\\" de c-ares, que es usada para analizar las respuestas NAPTR, podr\u00eda ser activada para leer la memoria fuera del b\u00fafer de entrada dado si el pasado en el paquete de respuesta DNS fue creado de una manera particular.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:c-ares:c-ares:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7BDB0FC-AA36-4C41-B3DC-201F0DE0191A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:c-ares:c-ares:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B38F8E2-7710-4303-A80F-9009619BEC7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:c-ares:c-ares:1.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA1637EF-3393-4770-91AE-89EA53D57830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:c-ares:c-ares:1.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93FA2559-0DB1-49BE-A6E6-C73408F4AB57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:c-ares:c-ares:1.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92EADF5-3500-4F37-808E-41DC48DE8D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:c-ares_project:c-ares:1.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F4F4BD-4316-4CB2-8FCE-9EE5C59E64EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:c-ares_project:c-ares:1.11.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"476034B6-69BF-4130-8139-D5DDC1EB0028\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndIncluding\":\"4.1.2\",\"matchCriteriaId\":\"A47FC4F7-1F77-4314-B4B3-3C5D8E335379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"4.2.0\",\"versionEndExcluding\":\"4.8.4\",\"matchCriteriaId\":\"AC1070A7-E3E0-423C-A73A-040FCED8AD96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndIncluding\":\"5.12.0\",\"matchCriteriaId\":\"121E5D5D-B4D9-43F3-B5C9-74590192FAF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.8.1\",\"matchCriteriaId\":\"D107EC29-67E7-40C3-8E5A-324C9105C5E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"6.9.0\",\"versionEndExcluding\":\"6.11.1\",\"matchCriteriaId\":\"6EA3B1B4-3576-4508-AC77-4AE3A5622E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.10.1\",\"matchCriteriaId\":\"B9C02D94-B713-4BE4-8C26-F21C2ADC01B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.1.4\",\"matchCriteriaId\":\"02C6E585-2704-4EC2-BED1-CF6D61BE9CC9\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/99148\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://c-ares.haxx.se/0616.patch\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://c-ares.haxx.se/adv_20170620.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99148\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://c-ares.haxx.se/0616.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://c-ares.haxx.se/adv_20170620.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2023-AVI-0499
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus Network Monitor. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Nessus Network Monitor | Nessus Network Monitor versions antérieures à 6.2.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 6.2.2",
"product": {
"name": "Nessus Network Monitor",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2019-19317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2016-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4609"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2016-9596",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9596"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2019-19244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2017-1000381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000381"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2023-31124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31124"
},
{
"name": "CVE-2022-31160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31160"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23395"
},
{
"name": "CVE-2022-4904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2017-1000061",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000061"
},
{
"name": "CVE-2017-9048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9048"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2019-9936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9936"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2020-35525",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35525"
},
{
"name": "CVE-2017-9050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9050"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2013-1969",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1969"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2019-19956",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19956"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2011-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3970"
},
{
"name": "CVE-2019-19646",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
},
{
"name": "CVE-2012-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2871"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2019-19924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2019-20388",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20388"
},
{
"name": "CVE-2019-13117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13117"
},
{
"name": "CVE-2019-20218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20218"
},
{
"name": "CVE-2023-31147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31147"
},
{
"name": "CVE-2018-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14567"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2019-8457",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2019-19242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2020-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7595"
},
{
"name": "CVE-2016-2073",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2073"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2015-7941",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7941"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-7942",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7942"
},
{
"name": "CVE-2015-8710",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8710"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2021-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3672"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2016-9598",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9598"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2019-13118",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13118"
},
{
"name": "CVE-2016-4607",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4607"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2016-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3709"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2016-9597",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9597"
},
{
"name": "CVE-2015-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8806"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2019-19645",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19645"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-5180",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5180"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2019-16168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16168"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2017-9049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9049"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2019-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9937"
},
{
"name": "CVE-2019-5815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5815"
},
{
"name": "CVE-2019-19959",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19959"
},
{
"name": "CVE-2019-19603",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19603"
},
{
"name": "CVE-2011-1202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1202"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2017-8872",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8872"
},
{
"name": "CVE-2020-35527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35527"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2017-5969",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5969"
},
{
"name": "CVE-2020-13435",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
},
{
"name": "CVE-2016-4483",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4483"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0499",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus\nNetwork Monitor. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\nex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus Network Monitor",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2023-23 du 29 juin 2023",
"url": "https://www.tenable.com/security/tns-2023-23"
}
]
}
CERTFR-2023-AVI-0499
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Tenable Nessus Network Monitor. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Nessus Network Monitor | Nessus Network Monitor versions antérieures à 6.2.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 6.2.2",
"product": {
"name": "Nessus Network Monitor",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2020-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2019-19317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2016-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4609"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2016-9596",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9596"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2019-19244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2017-1000381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000381"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2023-31124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31124"
},
{
"name": "CVE-2022-31160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31160"
},
{
"name": "CVE-2020-13632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23395"
},
{
"name": "CVE-2022-4904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2017-1000061",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000061"
},
{
"name": "CVE-2017-9048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9048"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2020-9327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
},
{
"name": "CVE-2019-9936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9936"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2020-35525",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35525"
},
{
"name": "CVE-2017-9050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9050"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2013-1969",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1969"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2019-19956",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19956"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2020-13630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2011-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3970"
},
{
"name": "CVE-2019-19646",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
},
{
"name": "CVE-2012-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2871"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2019-19924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2019-20388",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20388"
},
{
"name": "CVE-2019-13117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13117"
},
{
"name": "CVE-2019-20218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20218"
},
{
"name": "CVE-2023-31147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31147"
},
{
"name": "CVE-2018-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14567"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2019-8457",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2019-19242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2020-7595",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7595"
},
{
"name": "CVE-2016-2073",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2073"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2015-7941",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7941"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-7942",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7942"
},
{
"name": "CVE-2015-8710",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8710"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2021-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3672"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2016-9598",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9598"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2019-13118",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13118"
},
{
"name": "CVE-2016-4607",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4607"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2020-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2016-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3709"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2016-9597",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9597"
},
{
"name": "CVE-2015-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8806"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2019-19645",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19645"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-5180",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5180"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2020-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2019-16168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16168"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2017-9049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9049"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2019-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9937"
},
{
"name": "CVE-2019-5815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5815"
},
{
"name": "CVE-2019-19959",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19959"
},
{
"name": "CVE-2019-19603",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19603"
},
{
"name": "CVE-2011-1202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1202"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2017-8872",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8872"
},
{
"name": "CVE-2020-35527",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35527"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2017-5969",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5969"
},
{
"name": "CVE-2020-13435",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
},
{
"name": "CVE-2016-4483",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4483"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0499",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus\nNetwork Monitor. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\nex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus Network Monitor",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2023-23 du 29 juin 2023",
"url": "https://www.tenable.com/security/tns-2023-23"
}
]
}
BDU:2018-00106
Vulnerability from fstec - Published: 20.05.2017{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 1.8.0 (c-ares), 1.9.0 (c-ares), 1.9.1 (c-ares), 1.10.0 (c-ares), 1.11.0 (c-ares), 1.11.0 RC1 (c-ares), 1.12.0 (c-ares)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f c-ares \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttps://c-ares.haxx.se/adv_20170620.html\n\n\u0414\u043b\u044f Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 1.9.1-3+deb7u2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "20.05.2017",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "24.01.2018",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2018-00106",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2017-1000381",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), c-ares",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ares_parse_naptr_reply \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0430\u0441\u0438\u043d\u0445\u0440\u043e\u043d\u043d\u044b\u0445 DNS-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 c-ares, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0447\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ares_parse_naptr_reply \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0430\u0441\u0438\u043d\u0445\u0440\u043e\u043d\u043d\u044b\u0445 DNS-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 c-ares \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u0438 \u0430\u043d\u0430\u043b\u0438\u0437\u0435 NAPTR-\u043e\u0442\u0432\u0435\u0442\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u0447\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e DNS-\u043e\u0442\u0432\u0435\u0442\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://www.securityfocus.com/bid/99148\nhttps://c-ares.haxx.se/0616.patch\nhttps://c-ares.haxx.se/adv_20170620.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
CNVD-2017-15808
Vulnerability from cnvd - Published: 2017-07-21厂商已发布漏洞修复程序,请及时关注更新: https://c-ares.haxx.se/adv_20170620.html
| Name | C-ares C-ares >=1.8.0,<=1.12.0 |
|---|
{
"bids": {
"bid": {
"bidNumber": "99148"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-1000381"
}
},
"description": "c-ares\u662f\u4e00\u4e2a\u7528\u4e8e\u5f02\u6b65\u6267\u884cDNS\u8bf7\u6c42\u548c\u540d\u79f0\u89e3\u6790\u7684C\u5e93\u3002\r\n\r\nc-ares 1.8.0\u7248\u672c\u81f31.12.0\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
"discovererName": "LCatro",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://c-ares.haxx.se/adv_20170620.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-15808",
"openTime": "2017-07-21",
"patchDescription": "c-ares\u662f\u4e00\u4e2a\u7528\u4e8e\u5f02\u6b65\u6267\u884cDNS\u8bf7\u6c42\u548c\u540d\u79f0\u89e3\u6790\u7684C\u5e93\u3002\r\n\r\nc-ares 1.8.0\u7248\u672c\u81f31.12.0\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "c-ares NAPTR\u89e3\u6790\u5668\u8d8a\u754c\u8bbf\u95ee\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "C-ares C-ares \u003e=1.8.0\uff0c\u003c=1.12.0"
},
"referenceLink": "https://c-ares.haxx.se/adv_20170620.html",
"serverity": "\u4e2d",
"submitTime": "2017-06-21",
"title": "c-ares NAPTR\u89e3\u6790\u5668\u8d8a\u754c\u8bbf\u95ee\u6f0f\u6d1e"
}
FKIE_CVE-2017-1000381
Vulnerability from fkie_nvd - Published: 2017-07-07 17:29 - Updated: 2026-05-13 00:24| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.securityfocus.com/bid/99148 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://c-ares.haxx.se/0616.patch | Mailing List, Vendor Advisory | |
| cve@mitre.org | https://c-ares.haxx.se/adv_20170620.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99148 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://c-ares.haxx.se/0616.patch | Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://c-ares.haxx.se/adv_20170620.html | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| c-ares | c-ares | 1.8.0 | |
| c-ares | c-ares | 1.9.0 | |
| c-ares | c-ares | 1.9.1 | |
| c-ares | c-ares | 1.10.0 | |
| c-ares | c-ares | 1.12.0 | |
| c-ares_project | c-ares | 1.11.0 | |
| c-ares_project | c-ares | 1.11.0 | |
| nodejs | node.js | * | |
| nodejs | node.js | * | |
| nodejs | node.js | * | |
| nodejs | node.js | * | |
| nodejs | node.js | * | |
| nodejs | node.js | * | |
| nodejs | node.js | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:c-ares:c-ares:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7BDB0FC-AA36-4C41-B3DC-201F0DE0191A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B38F8E2-7710-4303-A80F-9009619BEC7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1637EF-3393-4770-91AE-89EA53D57830",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:c-ares:c-ares:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93FA2559-0DB1-49BE-A6E6-C73408F4AB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:c-ares:c-ares:1.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B92EADF5-3500-4F37-808E-41DC48DE8D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8F4F4BD-4316-4CB2-8FCE-9EE5C59E64EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.11.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "476034B6-69BF-4130-8139-D5DDC1EB0028",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"matchCriteriaId": "A47FC4F7-1F77-4314-B4B3-3C5D8E335379",
"versionEndIncluding": "4.1.2",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"matchCriteriaId": "AC1070A7-E3E0-423C-A73A-040FCED8AD96",
"versionEndExcluding": "4.8.4",
"versionStartIncluding": "4.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"matchCriteriaId": "121E5D5D-B4D9-43F3-B5C9-74590192FAF1",
"versionEndIncluding": "5.12.0",
"versionStartIncluding": "5.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"matchCriteriaId": "D107EC29-67E7-40C3-8E5A-324C9105C5E4",
"versionEndIncluding": "6.8.1",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"matchCriteriaId": "6EA3B1B4-3576-4508-AC77-4AE3A5622E09",
"versionEndExcluding": "6.11.1",
"versionStartIncluding": "6.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"matchCriteriaId": "B9C02D94-B713-4BE4-8C26-F21C2ADC01B0",
"versionEndExcluding": "7.10.1",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"matchCriteriaId": "02C6E585-2704-4EC2-BED1-CF6D61BE9CC9",
"versionEndExcluding": "8.1.4",
"versionStartIncluding": "8.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way."
},
{
"lang": "es",
"value": "La funci\u00f3n \"ares_parse_naptr_reply()\" de c-ares, que es usada para analizar las respuestas NAPTR, podr\u00eda ser activada para leer la memoria fuera del b\u00fafer de entrada dado si el pasado en el paquete de respuesta DNS fue creado de una manera particular."
}
],
"id": "CVE-2017-1000381",
"lastModified": "2026-05-13T00:24:29.033",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-07-07T17:29:00.307",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99148"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://c-ares.haxx.se/0616.patch"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://c-ares.haxx.se/adv_20170620.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99148"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://c-ares.haxx.se/0616.patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://c-ares.haxx.se/adv_20170620.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-VJR3-54H8-WHPV
Vulnerability from github – Published: 2022-05-17 02:28 – Updated: 2022-05-17 02:28The c-ares function ares_parse_naptr_reply(), which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
{
"affected": [],
"aliases": [
"CVE-2017-1000381"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-07-07T17:29:00Z",
"severity": "HIGH"
},
"details": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.",
"id": "GHSA-vjr3-54h8-whpv",
"modified": "2022-05-17T02:28:33Z",
"published": "2022-05-17T02:28:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000381"
},
{
"type": "WEB",
"url": "https://c-ares.haxx.se/0616.patch"
},
{
"type": "WEB",
"url": "https://c-ares.haxx.se/adv_20170620.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/99148"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2017-1000381
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-1000381",
"description": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.",
"id": "GSD-2017-1000381",
"references": [
"https://www.suse.com/security/cve/CVE-2017-1000381.html",
"https://access.redhat.com/errata/RHSA-2017:2908",
"https://ubuntu.com/security/CVE-2017-1000381",
"https://advisories.mageia.org/CVE-2017-1000381.html",
"https://security.archlinux.org/CVE-2017-1000381",
"https://alas.aws.amazon.com/cve/html/CVE-2017-1000381.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-1000381"
],
"details": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.",
"id": "GSD-2017-1000381",
"modified": "2023-12-13T01:21:02.242541Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000381",
"REQUESTER": "daniel@haxx.se",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://c-ares.haxx.se/0616.patch",
"refsource": "CONFIRM",
"url": "https://c-ares.haxx.se/0616.patch"
},
{
"name": "99148",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99148"
},
{
"name": "https://c-ares.haxx.se/adv_20170620.html",
"refsource": "CONFIRM",
"url": "https://c-ares.haxx.se/adv_20170620.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:c-ares_project:c-ares:1.11.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:c-ares_project:c-ares:1.11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:c-ares:c-ares:1.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:c-ares:c-ares:1.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:c-ares:c-ares:1.10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:c-ares:c-ares:1.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:c-ares:c-ares:1.12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.1.2",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.8.1",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.8.4",
"versionStartIncluding": "4.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.1.4",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe_name": [],
"versionEndExcluding": "7.10.1",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.11.1",
"versionStartIncluding": "6.9.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.12.0",
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000381"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://c-ares.haxx.se/adv_20170620.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://c-ares.haxx.se/adv_20170620.html"
},
{
"name": "https://c-ares.haxx.se/0616.patch",
"refsource": "CONFIRM",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://c-ares.haxx.se/0616.patch"
},
{
"name": "99148",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99148"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-09-15T11:42Z",
"publishedDate": "2017-07-07T17:29Z"
}
}
}
OPENSUSE-SU-2024:10668-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "c-ares-devel-1.17.2-2.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the c-ares-devel-1.17.2-2.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10668",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10668-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000381 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8277 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3672 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3672/"
}
],
"title": "c-ares-devel-1.17.2-2.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10668-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "c-ares-devel-1.17.2-2.2.aarch64",
"product": {
"name": "c-ares-devel-1.17.2-2.2.aarch64",
"product_id": "c-ares-devel-1.17.2-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "c-ares-utils-1.17.2-2.2.aarch64",
"product": {
"name": "c-ares-utils-1.17.2-2.2.aarch64",
"product_id": "c-ares-utils-1.17.2-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "libcares2-1.17.2-2.2.aarch64",
"product": {
"name": "libcares2-1.17.2-2.2.aarch64",
"product_id": "libcares2-1.17.2-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "libcares2-32bit-1.17.2-2.2.aarch64",
"product": {
"name": "libcares2-32bit-1.17.2-2.2.aarch64",
"product_id": "libcares2-32bit-1.17.2-2.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "c-ares-devel-1.17.2-2.2.ppc64le",
"product": {
"name": "c-ares-devel-1.17.2-2.2.ppc64le",
"product_id": "c-ares-devel-1.17.2-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "c-ares-utils-1.17.2-2.2.ppc64le",
"product": {
"name": "c-ares-utils-1.17.2-2.2.ppc64le",
"product_id": "c-ares-utils-1.17.2-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libcares2-1.17.2-2.2.ppc64le",
"product": {
"name": "libcares2-1.17.2-2.2.ppc64le",
"product_id": "libcares2-1.17.2-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libcares2-32bit-1.17.2-2.2.ppc64le",
"product": {
"name": "libcares2-32bit-1.17.2-2.2.ppc64le",
"product_id": "libcares2-32bit-1.17.2-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "c-ares-devel-1.17.2-2.2.s390x",
"product": {
"name": "c-ares-devel-1.17.2-2.2.s390x",
"product_id": "c-ares-devel-1.17.2-2.2.s390x"
}
},
{
"category": "product_version",
"name": "c-ares-utils-1.17.2-2.2.s390x",
"product": {
"name": "c-ares-utils-1.17.2-2.2.s390x",
"product_id": "c-ares-utils-1.17.2-2.2.s390x"
}
},
{
"category": "product_version",
"name": "libcares2-1.17.2-2.2.s390x",
"product": {
"name": "libcares2-1.17.2-2.2.s390x",
"product_id": "libcares2-1.17.2-2.2.s390x"
}
},
{
"category": "product_version",
"name": "libcares2-32bit-1.17.2-2.2.s390x",
"product": {
"name": "libcares2-32bit-1.17.2-2.2.s390x",
"product_id": "libcares2-32bit-1.17.2-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "c-ares-devel-1.17.2-2.2.x86_64",
"product": {
"name": "c-ares-devel-1.17.2-2.2.x86_64",
"product_id": "c-ares-devel-1.17.2-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "c-ares-utils-1.17.2-2.2.x86_64",
"product": {
"name": "c-ares-utils-1.17.2-2.2.x86_64",
"product_id": "c-ares-utils-1.17.2-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "libcares2-1.17.2-2.2.x86_64",
"product": {
"name": "libcares2-1.17.2-2.2.x86_64",
"product_id": "libcares2-1.17.2-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "libcares2-32bit-1.17.2-2.2.x86_64",
"product": {
"name": "libcares2-32bit-1.17.2-2.2.x86_64",
"product_id": "libcares2-32bit-1.17.2-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "c-ares-devel-1.17.2-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64"
},
"product_reference": "c-ares-devel-1.17.2-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "c-ares-devel-1.17.2-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le"
},
"product_reference": "c-ares-devel-1.17.2-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "c-ares-devel-1.17.2-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x"
},
"product_reference": "c-ares-devel-1.17.2-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "c-ares-devel-1.17.2-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64"
},
"product_reference": "c-ares-devel-1.17.2-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "c-ares-utils-1.17.2-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64"
},
"product_reference": "c-ares-utils-1.17.2-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "c-ares-utils-1.17.2-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le"
},
"product_reference": "c-ares-utils-1.17.2-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "c-ares-utils-1.17.2-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x"
},
"product_reference": "c-ares-utils-1.17.2-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "c-ares-utils-1.17.2-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64"
},
"product_reference": "c-ares-utils-1.17.2-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcares2-1.17.2-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64"
},
"product_reference": "libcares2-1.17.2-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcares2-1.17.2-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le"
},
"product_reference": "libcares2-1.17.2-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcares2-1.17.2-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x"
},
"product_reference": "libcares2-1.17.2-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcares2-1.17.2-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64"
},
"product_reference": "libcares2-1.17.2-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcares2-32bit-1.17.2-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64"
},
"product_reference": "libcares2-32bit-1.17.2-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcares2-32bit-1.17.2-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le"
},
"product_reference": "libcares2-32bit-1.17.2-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcares2-32bit-1.17.2-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x"
},
"product_reference": "libcares2-32bit-1.17.2-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcares2-32bit-1.17.2-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
},
"product_reference": "libcares2-32bit-1.17.2-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000381"
}
],
"notes": [
{
"category": "general",
"text": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000381",
"url": "https://www.suse.com/security/cve/CVE-2017-1000381"
},
{
"category": "external",
"summary": "SUSE Bug 1044946 for CVE-2017-1000381",
"url": "https://bugzilla.suse.com/1044946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000381"
},
{
"cve": "CVE-2020-8277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8277"
}
],
"notes": [
{
"category": "general",
"text": "A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions \u003c 15.2.1, \u003c 14.15.1, and \u003c 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8277",
"url": "https://www.suse.com/security/cve/CVE-2020-8277"
},
{
"category": "external",
"summary": "SUSE Bug 1178882 for CVE-2020-8277",
"url": "https://bugzilla.suse.com/1178882"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-8277"
},
{
"cve": "CVE-2021-3672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3672"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3672",
"url": "https://www.suse.com/security/cve/CVE-2021-3672"
},
{
"category": "external",
"summary": "SUSE Bug 1188881 for CVE-2021-3672",
"url": "https://bugzilla.suse.com/1188881"
},
{
"category": "external",
"summary": "SUSE Bug 1193099 for CVE-2021-3672",
"url": "https://bugzilla.suse.com/1193099"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-devel-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:c-ares-utils-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-1.17.2-2.2.x86_64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.aarch64",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.ppc64le",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.s390x",
"openSUSE Tumbleweed:libcares2-32bit-1.17.2-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3672"
}
]
}
RHSA-2017:2908
Vulnerability from csaf_redhat - Published: 2017-10-18 07:51 - Updated: 2026-05-13 01:11It was found that Node.js was using a non-randomized seed when populating hash tables. An attacker, able to supply a large number of inputs, could send specially crafted entries to the Node.js application, maximizing hash collisions to trigger an excessive amount of CPU usage, resulting in a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs6-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs6-nodejs (6.11.3). (BZ#1476317)\n\nSecurity Fix(es):\n\n* It was found that Node.js was using a non-randomized seed when populating hash tables. An attacker, able to supply a large number of inputs, could send specially crafted entries to the Node.js application, maximizing hash collisions to trigger an excessive amount of CPU usage, resulting in a denial of service. (CVE-2017-11499)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:2908",
"url": "https://access.redhat.com/errata/RHSA-2017:2908"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1475327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475327"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2908.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs6-nodejs security update",
"tracking": {
"current_release_date": "2026-05-13T01:11:36+00:00",
"generator": {
"date": "2026-05-13T01:11:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2017:2908",
"initial_release_date": "2017-10-18T07:51:08+00:00",
"revision_history": [
{
"date": "2017-10-18T07:51:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-10-18T07:51:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-13T01:11:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"product_id": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs@6.11.3-2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"product_id": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-devel@6.11.3-2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"product_id": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-debuginfo@6.11.3-2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"product_id": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-devel@6.11.3-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"product_id": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs@6.11.3-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"product_id": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-debuginfo@6.11.3-2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"product": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"product_id": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs@6.11.3-2.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"product": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"product_id": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs@6.11.3-2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"product": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"product_id": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-docs@6.11.3-2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"product": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"product_id": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-docs@6.11.3-2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-11499",
"discovery_date": "2017-07-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1475327"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Node.js was using a non-randomized seed when populating hash tables. An attacker, able to supply a large number of inputs, could send specially crafted entries to the Node.js application, maximizing hash collisions to trigger an excessive amount of CPU usage, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Constant Hashtable Seeds vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-11499"
},
{
"category": "external",
"summary": "RHBZ#1475327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-11499",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-11499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11499"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/"
}
],
"release_date": "2017-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T07:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2908"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Constant Hashtable Seeds vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Daniel Stenberg"
]
},
{
"names": [
"LCatro"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2017-1000381",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1463132"
}
],
"notes": [
{
"category": "description",
"text": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "c-ares: NAPTR parser out of bounds access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000381"
},
{
"category": "external",
"summary": "RHBZ#1463132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463132"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000381"
},
{
"category": "external",
"summary": "https://c-ares.haxx.se/adv_20170620.html",
"url": "https://c-ares.haxx.se/adv_20170620.html"
}
],
"release_date": "2017-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T07:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2908"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "c-ares: NAPTR parser out of bounds access"
}
]
}
RHSA-2017_2908
Vulnerability from csaf_redhat - Published: 2017-10-18 07:51 - Updated: 2024-11-14 21:44It was found that Node.js was using a non-randomized seed when populating hash tables. An attacker, able to supply a large number of inputs, could send specially crafted entries to the Node.js application, maximizing hash collisions to trigger an excessive amount of CPU usage, resulting in a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-nodejs6-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs6-nodejs (6.11.3). (BZ#1476317)\n\nSecurity Fix(es):\n\n* It was found that Node.js was using a non-randomized seed when populating hash tables. An attacker, able to supply a large number of inputs, could send specially crafted entries to the Node.js application, maximizing hash collisions to trigger an excessive amount of CPU usage, resulting in a denial of service. (CVE-2017-11499)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:2908",
"url": "https://access.redhat.com/errata/RHSA-2017:2908"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1475327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475327"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2908.json"
}
],
"title": "Red Hat Security Advisory: rh-nodejs6-nodejs security update",
"tracking": {
"current_release_date": "2024-11-14T21:44:42+00:00",
"generator": {
"date": "2024-11-14T21:44:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2017:2908",
"initial_release_date": "2017-10-18T07:51:08+00:00",
"revision_history": [
{
"date": "2017-10-18T07:51:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-10-18T07:51:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T21:44:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"product_id": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs@6.11.3-2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"product_id": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-devel@6.11.3-2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"product_id": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-debuginfo@6.11.3-2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"product_id": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-devel@6.11.3-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"product_id": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs@6.11.3-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"product": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"product_id": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-debuginfo@6.11.3-2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"product": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"product_id": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs@6.11.3-2.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"product": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"product_id": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs@6.11.3-2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"product": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"product_id": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-docs@6.11.3-2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"product": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"product_id": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-nodejs6-nodejs-docs@6.11.3-2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64"
},
"product_reference": "rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
},
"product_reference": "rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-11499",
"discovery_date": "2017-07-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1475327"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Node.js was using a non-randomized seed when populating hash tables. An attacker, able to supply a large number of inputs, could send specially crafted entries to the Node.js application, maximizing hash collisions to trigger an excessive amount of CPU usage, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs: Constant Hashtable Seeds vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-11499"
},
{
"category": "external",
"summary": "RHBZ#1475327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-11499",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-11499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11499"
},
{
"category": "external",
"summary": "https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/",
"url": "https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/"
}
],
"release_date": "2017-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T07:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2908"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs: Constant Hashtable Seeds vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Daniel Stenberg"
]
},
{
"names": [
"LCatro"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2017-1000381",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1463132"
}
],
"notes": [
{
"category": "description",
"text": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "c-ares: NAPTR parser out of bounds access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000381"
},
{
"category": "external",
"summary": "RHBZ#1463132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463132"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000381"
},
{
"category": "external",
"summary": "https://c-ares.haxx.se/adv_20170620.html",
"url": "https://c-ares.haxx.se/adv_20170620.html"
}
],
"release_date": "2017-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-10-18T07:51:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:2908"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.src",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el6.x86_64",
"6Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el6.noarch",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Server-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.src",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-debuginfo-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-devel-0:6.11.3-2.el7.x86_64",
"7Workstation-RHSCL-2.4:rh-nodejs6-nodejs-docs-0:6.11.3-2.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "c-ares: NAPTR parser out of bounds access"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.