Improper Certificate Validation

Affecting node package, versions [12.0.0,12.15.0) || [13.0.0,13.8.0) || [10.0.0,10.19.0)

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

node is a JavaScript runtime built on Chrome's V8 JavaScript engine.

Affected versions of this package are vulnerable to Improper Certificate Validation. It is possible to trigger an assertion on a TLS server with a malformed certificate string. X509V3_EXT_print can return value different from 1 if the X509 extension does not support printing to a buffer. Instead of failing with an unrecoverable assertion. This vulnerability can be exploited by a user that can remotely connect to a TLS server and supply an invalid certificate, causing the server to crash. As such, this vulnerability could result in a denial-of-service vulnerability.

Remediation

Upgrade node to version 12.15.0, 13.8.0, 10.19.0 or higher.

References

CVSS Score

9.4
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    Low
  • Availability
    High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H/E:P/RL:O/RC:C
Credit
Unknown
CVE
CVE-2019-15604
CWE
CWE-295
Snyk ID
SNYK-UPSTREAM-NODE-546815
Disclosed
06 Feb, 2020
Published
06 Feb, 2020