CVE-2013-4450 – NodeJS: HTTP Pipelining DoS
https://notcve.org/view.php?id=CVE-2013-4450
The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response. El servidor HTTP en Node.js 0.10.x anterior a la versión 0.10.21 y 0.8.x anterior a 0.8.26 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y CPU) mediante el envío de un número largo de solicitudes canalizadas sin leer la respuesta. • http://blog.nodejs.org/2013/10/18/node-v0-10-21-stable http://blog.nodejs.org/2013/10/18/node-v0-8-26-maintenance http://lists.opensuse.org/opensuse-updates/2013-12/msg00051.html http://rhn.redhat.com/errata/RHSA-2013-1842.html http://www.openwall.com/lists/oss-security/2013/10/20/1 http://www.securityfocus.com/bid/63229 https://github.com/joyent/node/issues/6214 https://github.com/rapid7/metasploit-framework/pull/2548 https://groups.google.com/forum/# • CWE-20: Improper Input Validation •
CVE-2013-2882 – v8: remote DoS or unspecified other impact via type confusion
https://notcve.org/view.php?id=CVE-2013-2882
Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion." Google V8, usado en Google Chrome anterior a 28.0.1500.95, permite a atacantes remotos provocar una denegación de servicio y causar otro tipo de impacto a través de vectores que aprovechan "la confusión de tipos". • http://googlechromereleases.blogspot.com/2013/07/stable-channel-update_30.html http://rhn.redhat.com/errata/RHSA-2013-1201.html http://www.debian.org/security/2013/dsa-2732 https://code.google.com/p/chromium/issues/detail?id=260106 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17329 https://access.redhat.com/security/cve/CVE-2013-2882 https://bugzilla.redhat.com/show_bug.cgi?id=991116 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2012-2330
https://notcve.org/view.php?id=CVE-2012-2330
The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string. El método de actualización (Update) en src/node_http_parser.cc en Node.js antes de v0.6.17 y v0.7 antes de v0.7.8 no comprueba correctamente la longitud de una cadena, lo que permite a atacantes remotos obtener información sensible (contenidos del encabezado de la solicitud) y, posiblemente, HTTP falsear cabeceras a través de una cadena de longitud cero. • http://blog.nodejs.org/2012/05/04/version-0-6-17-stable http://secunia.com/advisories/49066 http://www.openwall.com/lists/oss-security/2012/05/08/4 http://www.openwall.com/lists/oss-security/2012/05/08/8 https://github.com/joyent/node/commit/7b3fb22 https://github.com/joyent/node/commit/c9a231d https://support.f5.com/csp/article/K99038439?utm_source=f5support&%3Butm_medium=RSS • CWE-20: Improper Input Validation •