UBUNTU-CVE-2016-10518

Source
https://ubuntu.com/security/CVE-2016-10518
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10518.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2016-10518
Related
Published
2018-05-31T20:29:00Z
Modified
2025-01-13T10:21:17Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was found in the ping functionality of the ws module before 1.0.0 which allowed clients to allocate memory by sending a ping frame. The ping functionality by default responds with a pong frame and the previously given payload of the ping frame. This is exactly what you expect, but internally ws always transforms all data that we need to send to a Buffer instance and that is where the vulnerability existed. ws didn't do any checks for the type of data it was sending. With buffers in node when you allocate it when a number instead of a string it will allocate the amount of bytes.

References

Affected packages

Ubuntu:16.04:LTS / node-ws

Package

Name
node-ws
Purl
pkg:deb/ubuntu/node-ws@1.0.1+ds1.e6ddaae4-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1+ds1.e6ddaae4-1

Affected versions

0.*

0.7.2+ds1.349b7460-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1.0.1+ds1.e6ddaae4-1",
            "binary_name": "node-ws"
        },
        {
            "binary_version": "1.0.1+ds1.e6ddaae4-1",
            "binary_name": "node-ws-dbgsym"
        }
    ]
}