
CVE-2018-7164 – Gentoo Linux Security Advisory 202003-48
https://notcve.org/view.php?id=CVE-2018-7164
13 Jun 2018 — Node.js versions 9.7.0 and later and 10.x are vulnerable and the severity is MEDIUM. A bug introduced in 9.7.0 increases the memory consumed when reading from the network into JavaScript using the net.Socket object directly as a stream. An attacker could use this cause a denial of service by sending tiny chunks of data in short succession. This vulnerability was restored by reverting to the prior behaviour. Todas las versiones 9.7.0 y posteriores y 10.x de Node.js son vulnerables y la gravedad es MEDIA. • http://www.securityfocus.com/bid/104463 • CWE-400: Uncontrolled Resource Consumption •

CVE-2018-7162 – Gentoo Linux Security Advisory 202003-48
https://notcve.org/view.php?id=CVE-2018-7162
13 Jun 2018 — All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation. Todas las versiones 9.x y 10.x de Node.js son vulnerables y la gravedad es ALTA. • http://www.securityfocus.com/bid/104468 • CWE-20: Improper Input Validation •

CVE-2018-7167 – nodejs: Denial of Service by calling Buffer.fill() or Buffer.alloc() with specially crafted parameters
https://notcve.org/view.php?id=CVE-2018-7167
13 Jun 2018 — Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable. La llamada a Buffer.fill() o Buffer.alloc() con algunos parámetros puede con... • http://www.securityfocus.com/bid/106363 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2018-7161 – nodejs: denial of service (DoS) by causing a node server providing an http2 server to crash
https://notcve.org/view.php?id=CVE-2018-7161
13 Jun 2018 — All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation. Todas las versiones 8.x, 9.x y 10.x de Node.js son vulnerables y la gravedad es A... • http://www.securityfocus.com/bid/106363 • CWE-20: Improper Input Validation CWE-400: Uncontrolled Resource Consumption •

CVE-2018-0732 – Client DoS due to large DH parameter
https://notcve.org/view.php?id=CVE-2018-0732
12 Jun 2018 — During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html • CWE-320: Key Management Errors CWE-325: Missing Cryptographic Step •

CVE-2018-7159 – nodejs: HTTP parser allowed for spaces inside Content-Length header values
https://notcve.org/view.php?id=CVE-2018-7159
17 May 2018 — The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of th... • https://access.redhat.com/errata/RHSA-2019:2258 • CWE-20: Improper Input Validation CWE-115: Misinterpretation of Input •

CVE-2018-7160 – nodejs: Inspector DNS rebinding vulnerability
https://notcve.org/view.php?id=CVE-2018-7160
17 May 2018 — The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a No... • https://nodejs.org/en/blog/vulnerability/march-2018-security-releases • CWE-20: Improper Input Validation CWE-290: Authentication Bypass by Spoofing CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action •

CVE-2018-1000168 – nghttp2: Null pointer dereference when too large ALTSVC frame is received
https://notcve.org/view.php?id=CVE-2018-1000168
08 May 2018 — nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1. nghttp2 hasta la versión 1.10.0 y nghttp2 en versiones 1.31.0 y anteriores contienen una vulnerabilidad de validación incorrecta de entradas (CWE-20) en la gestión de tramas ALTSVC que puede re... • http://www.securityfocus.com/bid/103952 • CWE-20: Improper Input Validation CWE-476: NULL Pointer Dereference •

CVE-2017-15897
https://notcve.org/view.php?id=CVE-2017-15897
11 Dec 2017 — Node.js had a bug in versions 8.X and 9.X which caused buffers to not be initialized when the encoding for the fill value did not match the encoding specified. For example, 'Buffer.alloc(0x100, "This is not correctly encoded", "hex");' The buffer implementation was updated such that the buffer will be initialized to all zeros in these cases. Node.js tenía un bug en las versiones 8.X y 9.X que provocaba que los búfers no se inicializasen cuando la codificación para el valor de relleno no coincidía con la cod... • https://nodejs.org/en/blog/vulnerability/december-2017-security-releases • CWE-665: Improper Initialization •

CVE-2017-15896
https://notcve.org/view.php?id=CVE-2017-15896
11 Dec 2017 — Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption. Node.js se ha visto afectado por una vulnerabilidad de OpenSSL (CVE-2017-3737) en relación con el uso de SSL_read() debido a un error en la negociación TLS. El resultado era que un atacante de una red activa pod... • https://nodejs.org/en/blog/vulnerability/december-2017-security-releases •