Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"introduced": "15.0.0"
},
{
"fixed": "15.5.1"
}
],
"cpe": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"introduced": "10.0.0"
},
{
"fixed": "10.23.1"
},
{
"introduced": "12.0.0"
},
{
"fixed": "12.20.1"
},
{
"introduced": "14.0.0"
},
{
"fixed": "14.15.4"
}
],
"cpe": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"fixed": "1.0.1.1"
}
],
"cpe": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "10.0"
}
],
"cpe": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "32"
}
],
"cpe": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "33"
}
],
"cpe": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "19.3.4"
},
{
"last_affected": "20.3.0"
}
],
"cpe": [
"cpe:2.3:a:oracle:graalvm:19.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:20.3.0:*:*:*:enterprise:*:*:*"
],
"source": "CPE_FIELD"
}