Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 415075 (CVE-2012-2330) - <net-libs/nodejs-{0.6.17,0.7.8} HTTP server information disclosure (CVE-2012-2330)
Summary: <net-libs/nodejs-{0.6.17,0.7.8} HTTP server information disclosure (CVE-2012-...
Status: RESOLVED FIXED
Alias: CVE-2012-2330
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://blog.nodejs.org/2012/05/07/htt...
Whiteboard: ~3 [noglsa]
Keywords:
: 415103 (view as bug list)
Depends on:
Blocks:
 
Reported: 2012-05-07 21:08 UTC by Johan Bergström
Modified: 2012-08-14 11:19 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Johan Bergström 2012-05-07 21:08:59 UTC
re-posting here:

A carefully crafted attack request can cause the contents of the HTTP parser’s buffer to be appended to the attacking request’s header, making it appear to come from the attacker. Since it is generally safe to echo back contents of a request, this can allow an attacker to get an otherwise correctly designed server to divulge information about other requests. It is theoretically possible that it could enable header-spoofing attacks, though such an attack has not been demonstrated.

Versions affected: All versions of the 0.5/0.6 branch prior to 0.6.17, and all versions of the 0.7 branch prior to 0.7.8. Versions in the 0.4 branch are not affected.

Fix: Upgrade to v0.6.17, or apply the fix in c9a231d to your system.

We have: 0.6.15 and 0.7.8. I can confirm that bumping to 0.6.17 works nicely on my setups (already changed in production after confirming in staging)
Comment 1 Patrick Lauer gentoo-dev 2012-05-08 07:34:00 UTC
0.6.17 added, 0.7.8 already there, vulnerable versions punted.
Comment 2 Patrick Lauer gentoo-dev 2012-05-08 08:32:34 UTC
*** Bug 415103 has been marked as a duplicate of this bug. ***
Comment 3 Alex Legler (RETIRED) archtester gentoo-dev Security 2012-05-08 08:44:44 UTC
Package was never stable, closing noglsa.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2012-08-14 11:19:27 UTC
CVE-2012-2330 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2330):
  The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and
  0.7 before 0.7.8 does not properly check the length of a string, which
  allows remote attackers to obtain sensitive information (request header
  contents) and possibly spoof HTTP headers via a zero length string.