First published: Mon Jan 23 2017(Updated: )
The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a "catastrophic backtracking issue for the em inline rule," aka a "regular expression denial of service (ReDoS)."
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/marked | <0.3.4 | 0.3.4 |
Marked Project | <0.3.4 | |
Red Hat Fedora | =31 | |
Red Hat Fedora | =32 | |
Langgenius Dify Node.js | <=0.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8854 is classified as a denial of service vulnerability due to its potential for CPU consumption.
To fix CVE-2015-8854, upgrade the marked package to version 0.3.4 or later.
CVE-2015-8854 affects marked versions prior to 0.3.4 and Node.js versions up to 0.3.3.
In the context of CVE-2015-8854, ReDoS refers to the vulnerability exploiting the catastrophic backtracking of a regex pattern, leading to excessive resource consumption.
CVE-2015-8854 is specifically related to the marked package used in Node.js applications.