First published: Wed Jun 13 2018(Updated: )
Node.js versions 9.7.0 and later and 10.x are vulnerable and the severity is MEDIUM. A bug introduced in 9.7.0 increases the memory consumed when reading from the network into JavaScript using the net.Socket object directly as a stream. An attacker could use this cause a denial of service by sending tiny chunks of data in short succession. This vulnerability was restored by reverting to the prior behaviour.
Credit: cve-request@iojs.org
Affected Software | Affected Version | How to fix |
---|---|---|
Langgenius Dify Node.js | >=9.7.0<9.11.2 | |
Langgenius Dify Node.js | >=10.0.0<10.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-7164 is classified as MEDIUM.
CVE-2018-7164 increases memory consumption when reading from the network into JavaScript, potentially leading to a denial of service.
CVE-2018-7164 affects Node.js versions 9.7.0 to 9.11.2 and 10.0.0 to 10.4.1.
To mitigate CVE-2018-7164, upgrade Node.js to versions beyond 9.11.2 or 10.4.1.
No, CVE-2018-7164 is primarily a denial of service vulnerability, not a remote code execution vulnerability.