Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNwOTItODg2Zy1xeHBx
Remote Memory Exposure in floody
Versions of floody
before 0.1.1 are vulnerable to remote memory exposure.
.write(number)in the affected
floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory.
Proof of Concept:
var f = require('floody')(process.stdout);
f.write(USERSUPPLIEDINPUT);
'f.stop();
## Recommendation
Update to version 0.1.1 or later.
Permalink: https://github.com/advisories/GHSA-3p92-886g-qxpqJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNwOTItODg2Zy1xeHBx
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 5 years ago
Updated: almost 2 years ago
CVSS Score: 5.1
CVSS vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-3p92-886g-qxpq
References:
- https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0
- https://www.npmjs.com/advisories/601
- https://snyk.io/vuln/npm:floody:20160115
- https://github.com/advisories/GHSA-3p92-886g-qxpq
Blast Radius: 3.1
Affected Packages
npm:floody
Dependent packages: 3Dependent repositories: 4
Downloads: 10 last month
Affected Version Ranges: < 0.1.1
Fixed in: 0.1.1
All affected versions: 0.0.0, 0.0.1
All unaffected versions: 0.1.1