Vulnerability Description
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nodejs | Node.Js | >= 10.0.0, < 10.23.1 |
| Debian | Debian Linux | 10.0 |
| Fedoraproject | Fedora | 32 |
| Oracle | Graalvm | 19.3.4 |
| Siemens | Sinec Infrastructure Network Services | < 1.0.1.1 |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfPatchThird Party Advisory
- https://hackerone.com/reports/988103ExploitIssue TrackingPatch
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/PatchVendor Advisory
- https://security.gentoo.org/glsa/202101-07Third Party Advisory
- https://security.netapp.com/advisory/ntap-20210212-0003/Third Party Advisory
- https://www.debian.org/security/2021/dsa-4826Third Party Advisory
- https://www.oracle.com/security-alerts/cpujan2021.htmlThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfPatchThird Party Advisory
- https://hackerone.com/reports/988103ExploitIssue TrackingPatch
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/PatchVendor Advisory
- https://security.gentoo.org/glsa/202101-07Third Party Advisory
FAQ
What is CVE-2020-8265?
CVE-2020-8265 is a vulnerability with a CVSS score of 8.1 (HIGH). Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TL...
How severe is CVE-2020-8265?
CVE-2020-8265 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8265?
Check the references section above for vendor advisories and patch information. Affected products include: Nodejs Node.Js, Debian Debian Linux, Fedoraproject Fedora, Oracle Graalvm, Siemens Sinec Infrastructure Network Services.