MGASA-2016-0307

Source
https://advisories.mageia.org/MGASA-2016-0307.html
Import Source
https://advisories.mageia.org/MGASA-2016-0307.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0307
Related
Published
2016-09-21T20:38:22Z
Modified
2016-09-21T20:28:19Z
Summary
Updated nodejs packages fix security vulnerability
Details

Under certain conditions, V8 may improperly expand memory allocations in the Zone::New function. This could potentially be used to cause a Denial of Service via buffer overflow or as a trigger for a remote code execution (CVE-2016-1669).

The primary npm registry has used HTTP bearer tokens to authenticate requests from the npm command-line interface. Due to a design flaw in the CLI, these bearer tokens were sent with every request made by the CLI for logged-in users, regardless of the destination of the request. This flaw allows an attacker to set up an HTTP server that could collect authentication information they could use to impersonate the users whose tokens they collected. This impersonation would allow them to do anything the compromised users could do, including publishing new versions of packages.

References
Credits

Affected packages

Mageia:5 / nodejs

Package

Name
nodejs
Purl
pkg:rpm/mageia/nodejs?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.10.46-1.mga5

Ecosystem specific

{
    "section": "core"
}