Vulnerability Description
Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nodejs | Node.Js | < 6.14.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/106363Third Party AdvisoryVDB Entry
- https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/Vendor Advisory
- https://security.gentoo.org/glsa/202003-48Third Party Advisory
- http://www.securityfocus.com/bid/106363Third Party AdvisoryVDB Entry
- https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/Vendor Advisory
- https://security.gentoo.org/glsa/202003-48Third Party Advisory
FAQ
What is CVE-2018-7167?
CVE-2018-7167 is a vulnerability with a CVSS score of 7.5 (HIGH). Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc()...
How severe is CVE-2018-7167?
CVE-2018-7167 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7167?
Check the references section above for vendor advisories and patch information. Affected products include: Nodejs Node.Js.