Vulnerability Description
uws is a WebSocket server library. By sending a 256mb websocket message to a uws server instance with permessage-deflate enabled, there is a possibility used compression will shrink said 256mb down to less than 16mb of websocket payload which passes the length check of 16mb payload. This data will then inflate up to 256mb and crash the node process by exceeding V8's maximum string size. This affects uws >=0.10.0 <=0.10.8.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uws Project | Uws | >= 0.10.0, <= 0.10.8 |
Related Weaknesses (CWE)
References
- https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5PatchThird Party Advisory
- https://nodesecurity.io/advisories/149Third Party Advisory
- https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5PatchThird Party Advisory
- https://nodesecurity.io/advisories/149Third Party Advisory
FAQ
What is CVE-2016-10544?
CVE-2016-10544 is a vulnerability with a CVSS score of 5.9 (MEDIUM). uws is a WebSocket server library. By sending a 256mb websocket message to a uws server instance with permessage-deflate enabled, there is a possibility used compression will shrink said 256mb down to...
How severe is CVE-2016-10544?
CVE-2016-10544 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10544?
Check the references section above for vendor advisories and patch information. Affected products include: Uws Project Uws.