First published: Wed Apr 08 2015(Updated: )
The following issue was found in node: The SIGQUIT routine fails to close the app leaving the IP sockets open and in some cases DDOS the remote site if a user "ctrl-]+q" out of a telnet session. Also the app fails to close and more can be spawned by a crafty malicious user thus bringing the system to a point of no memory available. CVE request: <a href="http://seclists.org/oss-sec/2015/q2/41">http://seclists.org/oss-sec/2015/q2/41</a> Debian tracking bug for this issue: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777013">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777013</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Node.js |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1209781 is considered high due to its potential to allow a denial of service through socket leaks.
To fix REDHAT-BUG-1209781, you should apply the latest security patches provided by the Node.js maintainers.
REDHAT-BUG-1209781 affects systems running vulnerable versions of Node.js that utilize telnet for remote sessions.
Yes, REDHAT-BUG-1209781 can lead to a denial of service attack due to the inability to properly close IP sockets.
If you cannot update Node.js, consider restricting telnet access or implementing firewall rules to limit exposure.