Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2023-23918 CVE-2023-23919 CVE-2023-23920 CVE-2023-23936 CVE-2023-24807 |
CWE-ID | CWE-264 CWE-399 CWE-113 CWE-185 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP3 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing LTSS 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing ESPOS 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Enterprise Storage Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system nodejs16-docs Operating systems & Components / Operating system package or component npm16 Operating systems & Components / Operating system package or component nodejs16-debuginfo Operating systems & Components / Operating system package or component nodejs16 Operating systems & Components / Operating system package or component nodejs16-devel Operating systems & Components / Operating system package or component nodejs16-debugsource Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU72398
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-23918
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions within the process.mainModule.require() method. A remote user can access non authorized modules.
MitigationUpdate the affected package nodejs16 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP Applications 15: SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP3
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP3
SUSE Enterprise Storage: 7.1
SUSE Manager Server: 4.2
nodejs16-docs: before 16.19.1-150300.7.18.1
npm16: before 16.19.1-150300.7.18.1
nodejs16-debuginfo: before 16.19.1-150300.7.18.1
nodejs16: before 16.19.1-150300.7.18.1
nodejs16-devel: before 16.19.1-150300.7.18.1
nodejs16-debugsource: before 16.19.1-150300.7.18.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230673-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72399
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-23919
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to in some cases Node.js does does not clear the OpenSSL error stack after operations that may set it. A remote attacker can trigger false positive errors during subsequent cryptographic operations on the same thread and perform a denial of service (DoS) attack.
MitigationUpdate the affected package nodejs16 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP Applications 15: SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP3
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP3
SUSE Enterprise Storage: 7.1
SUSE Manager Server: 4.2
nodejs16-docs: before 16.19.1-150300.7.18.1
npm16: before 16.19.1-150300.7.18.1
nodejs16-debuginfo: before 16.19.1-150300.7.18.1
nodejs16: before 16.19.1-150300.7.18.1
nodejs16-devel: before 16.19.1-150300.7.18.1
nodejs16-debugsource: before 16.19.1-150300.7.18.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230673-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72400
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-23920
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to application insecurely loads ICU data through ICU_DATA environment variable with elevated privileges. A remote user can gain access to potentially sensitive information.
Update the affected package nodejs16 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP Applications 15: SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP3
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP3
SUSE Enterprise Storage: 7.1
SUSE Manager Server: 4.2
nodejs16-docs: before 16.19.1-150300.7.18.1
npm16: before 16.19.1-150300.7.18.1
nodejs16-debuginfo: before 16.19.1-150300.7.18.1
nodejs16: before 16.19.1-150300.7.18.1
nodejs16-devel: before 16.19.1-150300.7.18.1
nodejs16-debugsource: before 16.19.1-150300.7.18.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230673-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72403
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-23936
CWE-ID:
CWE-113 - Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform HTTP splitting attacks.
The vulnerability exists due to software does not correctly process CRLF character sequences when handling HTTP "Host" header. A remote attacker can send specially crafted request containing CRLF sequence and make the application to send a split HTTP response.
Successful exploitation of the vulnerability may allow an attacker perform cache poisoning attack.
MitigationUpdate the affected package nodejs16 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP Applications 15: SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP3
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP3
SUSE Enterprise Storage: 7.1
SUSE Manager Server: 4.2
nodejs16-docs: before 16.19.1-150300.7.18.1
npm16: before 16.19.1-150300.7.18.1
nodejs16-debuginfo: before 16.19.1-150300.7.18.1
nodejs16: before 16.19.1-150300.7.18.1
nodejs16-devel: before 16.19.1-150300.7.18.1
nodejs16-debugsource: before 16.19.1-150300.7.18.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230673-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72404
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-24807
CWE-ID:
CWE-185 - Incorrect Regular Expression
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation when user-supplied input within the `Headers.set()` and `Headers.append()` methods. A remote attacker can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.
Update the affected package nodejs16 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP Applications 15: SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP3
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP3
SUSE Enterprise Storage: 7.1
SUSE Manager Server: 4.2
nodejs16-docs: before 16.19.1-150300.7.18.1
npm16: before 16.19.1-150300.7.18.1
nodejs16-debuginfo: before 16.19.1-150300.7.18.1
nodejs16: before 16.19.1-150300.7.18.1
nodejs16-devel: before 16.19.1-150300.7.18.1
nodejs16-debugsource: before 16.19.1-150300.7.18.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20230673-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.