First published: Tue Aug 30 2016(Updated: )
Cookie-signature is a library for signing cookies. Versions before 1.0.4 were vulnerable to timing attacks. External References: <a href="https://nodesecurity.io/advisories/134">https://nodesecurity.io/advisories/134</a> Upstream fix: <a href="https://github.com/tj/node-cookie-signature/commit/39791081692e9e14aa62855369e1c7f80fbfd50e">https://github.com/tj/node-cookie-signature/commit/39791081692e9e14aa62855369e1c7f80fbfd50e</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/node-cookie-signature | 1.1.0-2 1.1.0+~1.0.3-2 1.2.1+~1.1.2-1 | |
redhat/nodejs-cookie-signature | <1.0.4 | 1.0.4 |
cookie-signature | <1.0.6 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1000236 has a moderate severity level due to the potential for timing attacks.
To fix CVE-2016-1000236, upgrade to version 1.0.4 or later for affected libraries.
CVE-2016-1000236 affects versions before 1.0.4 of the cookie-signature library.
CVE-2016-1000236 is vulnerable to timing attacks, which could lead to information leakage.
CVE-2016-1000236 is not present in versions 1.0.4 and above, as they contain the necessary security fixes.