Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-25881 |
CWE-ID | CWE-407 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Web and Scripting Module Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system nodejs16-docs Operating systems & Components / Operating system package or component npm16 Operating systems & Components / Operating system package or component nodejs16-debugsource Operating systems & Components / Operating system package or component nodejs16 Operating systems & Components / Operating system package or component corepack16 Operating systems & Components / Operating system package or component nodejs16-debuginfo Operating systems & Components / Operating system package or component nodejs16-devel Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU72750
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-25881
CWE-ID:
CWE-407 - Inefficient Algorithmic Complexity
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to regular expression denial of service that occurs when the server reads the cache policy from the request using this library. A remote unauthenticated attacker can send malicious request header values to the server and perform a denial of service attack.
MitigationUpdate the affected package nodejs16 to the latest version.
Vulnerable software versionsWeb and Scripting Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
nodejs16-docs: before 16.20.0-150400.3.18.2
npm16: before 16.20.0-150400.3.18.2
nodejs16-debugsource: before 16.20.0-150400.3.18.2
nodejs16: before 16.20.0-150400.3.18.2
corepack16: before 16.20.0-150400.3.18.2
nodejs16-debuginfo: before 16.20.0-150400.3.18.2
nodejs16-devel: before 16.20.0-150400.3.18.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20231924-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.