RHSA-2013:1842
Vulnerability from csaf_redhat
Published
2013-12-16 18:12
Modified
2024-11-14 13:10
Summary
Red Hat Security Advisory: nodejs010-nodejs security update

Notes

Topic
Updated nodejs010-nodejs packages that fix one security issue are now available for Red Hat Software Collections 1. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. A denial of service flaw was found in the way Node.js handled pipelined HTTP requests. A remote attacker could use this flaw to send an excessive amount of HTTP requests over a network connection, causing Node.js to use an excessive amount of memory and possibly exit when all available memory is exhausted. (CVE-2013-4450) Node.js is included in Red Hat Software Collections 1.0 as a Technology Preview. More information about Red Hat Technology Previews is available here: https://access.redhat.com/support/offerings/techpreview/ All nodejs010-nodejs users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
   document: {
      aggregate_severity: {
         namespace: "https://access.redhat.com/security/updates/classification/",
         text: "Moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright © Red Hat, Inc. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Updated nodejs010-nodejs packages that fix one security issue are now\navailable for Red Hat Software Collections 1.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
            title: "Topic",
         },
         {
            category: "general",
            text: "Node.js is a software development platform for building fast and scalable\nnetwork applications in the JavaScript programming language.\n\nA denial of service flaw was found in the way Node.js handled pipelined\nHTTP requests. A remote attacker could use this flaw to send an excessive\namount of HTTP requests over a network connection, causing Node.js to use\nan excessive amount of memory and possibly exit when all available memory\nis exhausted. (CVE-2013-4450)\n\nNode.js is included in Red Hat Software Collections 1.0 as a Technology\nPreview. More information about Red Hat Technology Previews is available\nhere: https://access.redhat.com/support/offerings/techpreview/\n\nAll nodejs010-nodejs users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.",
            title: "Details",
         },
         {
            category: "legal_disclaimer",
            text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
            title: "Terms of Use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://access.redhat.com/security/team/contact/",
         issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
         name: "Red Hat Product Security",
         namespace: "https://www.redhat.com",
      },
      references: [
         {
            category: "self",
            summary: "https://access.redhat.com/errata/RHSA-2013:1842",
            url: "https://access.redhat.com/errata/RHSA-2013:1842",
         },
         {
            category: "external",
            summary: "https://access.redhat.com/security/updates/classification/#moderate",
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            category: "external",
            summary: "1021170",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1021170",
         },
         {
            category: "self",
            summary: "Canonical URL",
            url: "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1842.json",
         },
      ],
      title: "Red Hat Security Advisory: nodejs010-nodejs security update",
      tracking: {
         current_release_date: "2024-11-14T13:10:47+00:00",
         generator: {
            date: "2024-11-14T13:10:47+00:00",
            engine: {
               name: "Red Hat SDEngine",
               version: "4.2.0",
            },
         },
         id: "RHSA-2013:1842",
         initial_release_date: "2013-12-16T18:12:00+00:00",
         revision_history: [
            {
               date: "2013-12-16T18:12:00+00:00",
               number: "1",
               summary: "Initial version",
            },
            {
               date: "2013-12-16T18:21:53+00:00",
               number: "2",
               summary: "Last updated version",
            },
            {
               date: "2024-11-14T13:10:47+00:00",
               number: "3",
               summary: "Last generated version",
            },
         ],
         status: "final",
         version: "3",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)",
                        product: {
                           name: "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)",
                           product_id: "6Server-RHSCL-1.0",
                           product_identification_helper: {
                              cpe: "cpe:/a:redhat:rhel_software_collections:1::el6",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)",
                        product: {
                           name: "Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)",
                           product_id: "6Workstation-RHSCL-1.0",
                           product_identification_helper: {
                              cpe: "cpe:/a:redhat:rhel_software_collections:1::el6",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "Red Hat Software Collections",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
                        product: {
                           name: "nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
                           product_id: "nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/nodejs010-nodejs-docs@0.10.5-8.el6?arch=x86_64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
                        product: {
                           name: "nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
                           product_id: "nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/nodejs010-nodejs-devel@0.10.5-8.el6?arch=x86_64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
                        product: {
                           name: "nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
                           product_id: "nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/nodejs010-nodejs-debuginfo@0.10.5-8.el6?arch=x86_64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
                        product: {
                           name: "nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
                           product_id: "nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/nodejs010-nodejs@0.10.5-8.el6?arch=x86_64",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "nodejs010-nodejs-0:0.10.5-8.el6.src",
                        product: {
                           name: "nodejs010-nodejs-0:0.10.5-8.el6.src",
                           product_id: "nodejs010-nodejs-0:0.10.5-8.el6.src",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/nodejs010-nodejs@0.10.5-8.el6?arch=src",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "src",
               },
            ],
            category: "vendor",
            name: "Red Hat",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-0:0.10.5-8.el6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)",
               product_id: "6Server-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.src",
            },
            product_reference: "nodejs010-nodejs-0:0.10.5-8.el6.src",
            relates_to_product_reference: "6Server-RHSCL-1.0",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-0:0.10.5-8.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)",
               product_id: "6Server-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
            },
            product_reference: "nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
            relates_to_product_reference: "6Server-RHSCL-1.0",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)",
               product_id: "6Server-RHSCL-1.0:nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
            },
            product_reference: "nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
            relates_to_product_reference: "6Server-RHSCL-1.0",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)",
               product_id: "6Server-RHSCL-1.0:nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
            },
            product_reference: "nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
            relates_to_product_reference: "6Server-RHSCL-1.0",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)",
               product_id: "6Server-RHSCL-1.0:nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
            },
            product_reference: "nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
            relates_to_product_reference: "6Server-RHSCL-1.0",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-0:0.10.5-8.el6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)",
               product_id: "6Workstation-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.src",
            },
            product_reference: "nodejs010-nodejs-0:0.10.5-8.el6.src",
            relates_to_product_reference: "6Workstation-RHSCL-1.0",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-0:0.10.5-8.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)",
               product_id: "6Workstation-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
            },
            product_reference: "nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
            relates_to_product_reference: "6Workstation-RHSCL-1.0",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)",
               product_id: "6Workstation-RHSCL-1.0:nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
            },
            product_reference: "nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
            relates_to_product_reference: "6Workstation-RHSCL-1.0",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)",
               product_id: "6Workstation-RHSCL-1.0:nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
            },
            product_reference: "nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
            relates_to_product_reference: "6Workstation-RHSCL-1.0",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)",
               product_id: "6Workstation-RHSCL-1.0:nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
            },
            product_reference: "nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
            relates_to_product_reference: "6Workstation-RHSCL-1.0",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2013-4450",
         discovery_date: "2013-10-19T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "1021170",
            },
         ],
         notes: [
            {
               category: "description",
               text: "The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "NodeJS: HTTP Pipelining DoS",
               title: "Vulnerability summary",
            },
            {
               category: "other",
               text: "OpenShift Enterprise 1.2 is in a lifecycle phase that only provides Critical and Important security updates, as this issue is rated Moderate this issue will not be fixed. For additional information, refer to the Red Hat OpenShift Enterprise Life Cycle: https://access.redhat.com/support/policy/updates/openshift.",
               title: "Statement",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "6Server-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.src",
               "6Server-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
               "6Server-RHSCL-1.0:nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
               "6Server-RHSCL-1.0:nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
               "6Server-RHSCL-1.0:nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
               "6Workstation-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.src",
               "6Workstation-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
               "6Workstation-RHSCL-1.0:nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
               "6Workstation-RHSCL-1.0:nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
               "6Workstation-RHSCL-1.0:nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2013-4450",
            },
            {
               category: "external",
               summary: "RHBZ#1021170",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1021170",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2013-4450",
               url: "https://www.cve.org/CVERecord?id=CVE-2013-4450",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2013-4450",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2013-4450",
            },
         ],
         release_date: "2013-10-18T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2013-12-16T18:12:00+00:00",
               details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
               product_ids: [
                  "6Server-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.src",
                  "6Server-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
                  "6Server-RHSCL-1.0:nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
                  "6Server-RHSCL-1.0:nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
                  "6Server-RHSCL-1.0:nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.src",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2013:1842",
            },
         ],
         scores: [
            {
               cvss_v2: {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               products: [
                  "6Server-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.src",
                  "6Server-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
                  "6Server-RHSCL-1.0:nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
                  "6Server-RHSCL-1.0:nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
                  "6Server-RHSCL-1.0:nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.src",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-0:0.10.5-8.el6.x86_64",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-debuginfo-0:0.10.5-8.el6.x86_64",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-devel-0:0.10.5-8.el6.x86_64",
                  "6Workstation-RHSCL-1.0:nodejs010-nodejs-docs-0:0.10.5-8.el6.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "NodeJS: HTTP Pipelining DoS",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.