Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-8265


Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.


Published

2021-01-06T21:15:14.410

Last Modified

2024-11-21T05:38:37.120

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-416
  • Type: Primary
    CWE-416

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application nodejs node.js < 10.23.1 Yes
Application nodejs node.js < 12.20.1 Yes
Application nodejs node.js < 14.15.4 Yes
Application nodejs node.js < 15.5.1 Yes
Operating System debian debian_linux 10.0 Yes
Operating System fedoraproject fedora 32 Yes
Operating System fedoraproject fedora 33 Yes
Application oracle graalvm 19.3.4 Yes
Application oracle graalvm 20.3.0 Yes
Application siemens sinec_infrastructure_network_services < 1.0.1.1 Yes

References