9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
Node.js vulnerabilities in Node.js and the V8 Javascript engine were disclosed on October 18 2016, by the Node.js Foundation. IBM SDK for Node.js has addressed the applicable CVEs.
CVEID: CVE-2016-5180 DESCRIPTION: The V8 Javascript engine, as used in Google Chrome OS and Node.js, is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by c-ares. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base Score: 7.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/117436> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
CVEID: CVE-2016-5172 DESCRIPTION: The V8 Javascript engine, as used in Google Chrome and Node.js, could allow a remote attacker to obtain sensitive information, caused by an arbitrary memory read. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/116811> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)
CVEID: None DESCRIPTION: Node.js could provide weaker than expected security, caused by the failure to create a unique v8_inspector WebSocket address. By connecting to the Node.js process via the v8_inspector port when running with --inspect, an attacker could exploit this vulnerability to gain unauthorizied access to the v8_inspector protocol.
CVSS Base Score: 6.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/118651> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
CVEID: None DESCRIPTION: Node.js could allow a remote attacker to bypass security restrictions, caused by an error when attempting to load an OpenSSL configuration file from the OPENSSL_CONF environment variable. An attacker could exploit this vulnerability to load compromised OpenSSL configuration into a Node.js process.
CVSS Base Score: 5.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/118650> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVE-2016-5180 affects IBM SDK for Node.js v1.1.1.4 and earlier releases.
CVE-2016-5180 affects IBM SDK for Node.js v1.2.0.15 and earlier releases.
CVE-2016-5180 affects IBM SDK for Node.js v4.6.0.0 and earlier releases.
CVE-2016-5172, X-Force 118650, and X-Force 118651 affect IBM SDK for Node.js v6.7.0.0 and earlier releases.
CVE ID
|
Fixed IBM SDK for Node.js releases
—|—
1.1.x
|
1.2.x
|
4.x
|
6.x
CVE-2016-5172
|
N/A
|
N/A
|
N/A
|
6.9.1.0
CVE-2016-5180
|
1.1.1.5
|
1.2.0.16
|
4.6.1.0
|
N/A
X-Force 118650
|
N/A
|
N/A
|
N/A
|
6.9.1.0
X-Force 118651
|
N/A
|
N/A
|
N/A
|
6.9.1.0
IBM SDK for Node.js can be downloaded, subject to the terms of the developerWorks license, from here.
IBM customers requiring an update for an SDK shipped with an IBM product should contact IBM support, and/or refer to the appropriate product security bulletin.
CPE | Name | Operator | Version |
---|---|---|---|
ibm sdk for node.js | eq | any |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P