Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-10518
HistoryMay 31, 2018 - 12:00 a.m.

CVE-2016-10518

2018-05-3100:00:00
ubuntu.com
ubuntu.com
10

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

51.9%

A vulnerability was found in the ping functionality of the ws module before
1.0.0 which allowed clients to allocate memory by sending a ping frame. The
ping functionality by default responds with a pong frame and the previously
given payload of the ping frame. This is exactly what you expect, but
internally ws always transforms all data that we need to send to a Buffer
instance and that is where the vulnerability existed. ws didn’t do any
checks for the type of data it was sending. With buffers in node when you
allocate it when a number instead of a string it will allocate the amount
of bytes.

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchnode-ws< 1.0.1+ds1.e6ddaae4-1UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

51.9%