HIGH · 8.1

CVE-2020-8265

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TL...

Vulnerability Description

Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.

CVSS Score

8.1

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
NodejsNode.Js>= 10.0.0, < 10.23.1
DebianDebian Linux10.0
FedoraprojectFedora32
OracleGraalvm19.3.4
SiemensSinec Infrastructure Network Services< 1.0.1.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-8265?

CVE-2020-8265 is a vulnerability with a CVSS score of 8.1 (HIGH). Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TL...

How severe is CVE-2020-8265?

CVE-2020-8265 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-8265?

Check the references section above for vendor advisories and patch information. Affected products include: Nodejs Node.Js, Debian Debian Linux, Fedoraproject Fedora, Oracle Graalvm, Siemens Sinec Infrastructure Network Services.