CVE-2016-1000232

Impact:
Moderate
Public Date:
2016-07-22
CWE:
CWE-400
Bugzilla:
1359818: CVE-2016-1000232 nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons
A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse an HTTP header with many semicolons could cause the application to consume an excessive amount of CPU.

Find out more about CVE-2016-1000232 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

CVSS v3 metrics

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact Low

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Software Collections for Red Hat Enterprise Linux 6 (rh-nodejs4-nodejs-tough-cookie) RHSA-2017:2912 2017-10-18
Red Hat Software Collections for Red Hat Enterprise Linux 7 (rh-nodejs4-nodejs-tough-cookie) RHSA-2017:2912 2017-10-18
Red Hat OpenShift Enterprise 3.1 (nodejs-tough-cookie) RHSA-2016:2101 2016-10-27
Red Hat OpenShift Container Platform 3.2 (nodejs-tough-cookie) RHSA-2016:2101 2016-10-27
Red Hat OpenShift Container Platform 3.3 (nodejs-tough-cookie) RHSA-2016:2101 2016-10-27

Affected Packages State

Platform Package State
Red Hat Software Collections for Red Hat Enterprise Linux nodejs010-nodejs-tough-cookie Will not fix
Red Hat Software Collections for Red Hat Enterprise Linux rh-nodejs6-nodejs-tough-cookie Not affected

External References

Last Modified