[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-2330Date: (C)2012-08-13   (M)2023-12-22


The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.4
Exploit Score: 10.0
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECUNIA-49066
http://www.openwall.com/lists/oss-security/2012/05/08/4
http://www.openwall.com/lists/oss-security/2012/05/08/8
http://blog.nodejs.org/2012/05/04/version-0-6-17-stable/
https://github.com/joyent/node/commit/7b3fb22
https://github.com/joyent/node/commit/c9a231d
https://support.f5.com/csp/article/K99038439?utm_source=f5support&%3Butm_medium=RSS

CWE    1
CWE-20

© SecPod Technologies