SB2014090501 - Buffer overflow in Node.js
Published: September 5, 2014 Updated: August 10, 2020
Security Bulletin ID
SB2014090501
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2014-5256)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Node.js 0.8 before 0.8.28 and 0.10 before 0.10.30 does not consider the possibility of recursive processing that triggers V8 garbage collection in conjunction with a V8 interrupt, which allows remote attackers to cause a denial of service (memory corruption and application crash) via deep JSON objects whose parsing lets this interrupt mask an overflow of the program stack.
Remediation
Install update from vendor's website.
References
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/
- http://secunia.com/advisories/61260
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:142
- http://www-01.ibm.com/support/docview.wss?uid=swg21684769
- https://github.com/joyent/node/commit/530af9cb8e700e7596b3ec812bad123c9fa06356