Lucene search

K
ubuntuUbuntuUSN-6672-1
HistoryMar 04, 2024 - 12:00 a.m.

Node.js vulnerabilities

2024-03-0400:00:00
ubuntu.com
16
node.js
security vulnerabilities
ubuntu 20.04
ubuntu 22.04 lts
ubuntu 23.10
denial of service
privilege escalation
asn.1
cross-platform

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

49.7%

Releases

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • nodejs - An open-source, cross-platform JavaScript runtime environment.

Details

Morgan Jones discovered that Node.js incorrectly handled certain inputs that
leads to false positive errors during some cryptographic operations. If a user
or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 23.10. (CVE-2023-23919)

It was discovered that Node.js incorrectly handled certain inputs leaded to a
untrusted search path vulnerability. If a user or an automated system were
tricked into opening a specially crafted input file, a remote attacker could
possibly use this issue to perform a privilege escalation. (CVE-2023-23920)

Matt Caswell discovered that Node.js incorrectly handled certain inputs with
specially crafted ASN.1 object identifiers or data containing them. If a user
or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-2650)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.10noarchlibnode108< 18.13.0+dfsg1-1ubuntu2.1UNKNOWN
Ubuntu23.10noarchlibnode-dev< 18.13.0+dfsg1-1ubuntu2.1UNKNOWN
Ubuntu23.10noarchlibnode108-dbgsym< 18.13.0+dfsg1-1ubuntu2.1UNKNOWN
Ubuntu23.10noarchnodejs< 18.13.0+dfsg1-1ubuntu2.1UNKNOWN
Ubuntu23.10noarchnodejs-dbgsym< 18.13.0+dfsg1-1ubuntu2.1UNKNOWN
Ubuntu23.10noarchnodejs-doc< 18.13.0+dfsg1-1ubuntu2.1UNKNOWN
Ubuntu22.04noarchlibnode72< 12.22.9~dfsg-1ubuntu3.4UNKNOWN
Ubuntu22.04noarchlibnode-dev< 12.22.9~dfsg-1ubuntu3.4UNKNOWN
Ubuntu22.04noarchlibnode72-dbgsym< 12.22.9~dfsg-1ubuntu3.4UNKNOWN
Ubuntu22.04noarchnodejs< 12.22.9~dfsg-1ubuntu3.4UNKNOWN
Rows per page:
1-10 of 181

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

49.7%