First published: Wed Mar 20 2019(Updated: )
In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.
Credit: cve-request@iojs.org cve-request@iojs.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nodejs Node.js | >=6.0.0<6.17.0 | |
Nodejs Node.js | >=8.0.0<8.15.1 | |
Nodejs Node.js | >=10.0.0<10.15.2 | |
Nodejs Node.js | >=11.0.0<11.10.1 | |
openSUSE Leap | =42.3 | |
redhat/nodejs | <6.17.0 | 6.17.0 |
redhat/nodejs | <8.15.1 | 8.15.1 |
redhat/nodejs | <10.15.2 | 10.15.2 |
redhat/nodejs | <11.10.1 | 11.10.1 |
>=6.0.0<6.17.0 | ||
>=8.0.0<8.15.1 | ||
>=10.0.0<10.15.2 | ||
>=11.0.0<11.10.1 | ||
=42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.