Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.883196
Kategorie:CentOS Local Security Checks
Titel:CentOS: Security Advisory for http-parser (CESA-2020:0703)
Zusammenfassung:The remote host is missing an update for the 'http-parser'; package(s) announced via the CESA-2020:0703 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'http-parser'
package(s) announced via the CESA-2020:0703 advisory.

Vulnerability Insight:
The http-parser package provides a utility for parsing HTTP messages. It
parses both requests and responses. The parser is designed to be used in
performance HTTP applications. It does not make any system calls or
allocations, it does not buffer data, and it can be interrupted at any
time. Depending on your architecture, it only requires about 40 bytes of
data per message stream.

Security Fix(es):

* nodejs: HTTP request smuggling using malformed Transfer-Encoding header
(CVE-2019-15605)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Affected Software/OS:
'http-parser' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2019-15605
https://nodejs.org/en/blog/release/v10.19.0/
https://nodejs.org/en/blog/release/v12.15.0/
https://nodejs.org/en/blog/release/v13.8.0/
https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/
https://security.netapp.com/advisory/ntap-20200221-0004/
Debian Security Information: DSA-4669 (Google Search)
https://www.debian.org/security/2020/dsa-4669
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CT3WTR4P5VAJ3GJGKPYEDUPTNZ3IEDUR/
https://security.gentoo.org/glsa/202003-48
https://hackerone.com/reports/735748
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
RedHat Security Advisories: RHSA-2020:0573
https://access.redhat.com/errata/RHSA-2020:0573
RedHat Security Advisories: RHSA-2020:0579
https://access.redhat.com/errata/RHSA-2020:0579
RedHat Security Advisories: RHSA-2020:0597
https://access.redhat.com/errata/RHSA-2020:0597
RedHat Security Advisories: RHSA-2020:0598
https://access.redhat.com/errata/RHSA-2020:0598
RedHat Security Advisories: RHSA-2020:0602
https://access.redhat.com/errata/RHSA-2020:0602
RedHat Security Advisories: RHSA-2020:0703
https://access.redhat.com/errata/RHSA-2020:0703
RedHat Security Advisories: RHSA-2020:0707
https://access.redhat.com/errata/RHSA-2020:0707
RedHat Security Advisories: RHSA-2020:0708
https://access.redhat.com/errata/RHSA-2020:0708
SuSE Security Announcement: openSUSE-SU-2020:0293 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.