First published: Tue Jun 12 2018(Updated: )
All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation.
Credit: cve-request@iojs.org
Affected Software | Affected Version | How to fix |
---|---|---|
Langgenius Dify Node.js | >=9.0.0<9.11.2 | |
Langgenius Dify Node.js | >=10.0.0<10.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-7162 is rated as HIGH.
To fix CVE-2018-7162, upgrade Node.js to version 9.11.2 or later, or version 10.4.1 or later.
CVE-2018-7162 affects all versions of Node.js from 9.0.0 to 9.11.2 and 10.0.0 to 10.4.1.
CVE-2018-7162 allows an attacker to execute a denial of service (DoS) attack.
An attacker can exploit CVE-2018-7162 by sending duplicate or unexpected messages during the TLS handshake.