Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTd4dmctbTN2eC0yaGh2
Downloads Resources over HTTP in webrtc-native
Affected versions of webrtc-native
insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running webrtc-native
.
Recommendation
No direct patch is currently available for this vulnerability.
However, if the native components of webrtc-native
are built from source, this avoids download the precompiled binary, therefore mitigating the insecure download.
The package author has provided instructions for building from source here.
Permalink: https://github.com/advisories/GHSA-7xvg-m3vx-2hhvJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTd4dmctbTN2eC0yaGh2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 6 years ago
Updated: almost 2 years ago
Identifiers: GHSA-7xvg-m3vx-2hhv, CVE-2016-10600
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-10600
- https://github.com/advisories/GHSA-7xvg-m3vx-2hhv
- https://www.npmjs.com/advisories/176
Affected Packages
npm:webrtc-native
Dependent packages: 4Dependent repositories: 3
Downloads: 103 last month
Affected Version Ranges: <= 1.4.0
No known fixed version
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9, 0.0.10, 0.0.11, 0.0.12, 0.0.13, 0.0.14, 0.0.15, 0.0.16, 0.0.17, 0.0.18, 0.0.19, 0.0.20, 0.0.21, 0.0.22, 0.0.23, 0.0.24, 0.0.25, 0.0.26, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.7, 1.3.8, 1.4.0