N|Solid is a superior Node.js platform enhanced to help you build, manage, secure, and analyze mission-critical Node.js applications.Get Started
NOTICE: Node.js Denial of Service Vulnerability Fix
Description and CVSS Score
A bug was discovered in Node.js versions 4.0.0 to 4.1.1 whereby an attacker could cause a denial of service by exploiting a bug in HTTP handling that results in a prematurely terminated process. This bug has been fixed with Node.js v4.1.2. For your own safety, we highly recommend that you update immediately, available on nodejs.org.
HTTP and HTTPS servers are vulnerable, it is also likely that TLS terminators and/or load balancers in front of Node.js processes will not mitigate against the bug.
Are you vulnerable?
- Versions 0.10 and 0.12 of Node.js are not affected.
- Versions 4.0.0, 4.1.0 and 4.1.1 of Node.js are vulnerable.
- Versions 1 and 2 of io.js are not affected but remain unsupported and users of these versions are encouraged to migrate to Node.js v4 at their earliest convenience.
- Version 3 of io.js is vulnerable and while io.js v3 is unsupported, a patch release with a fix will be made available some time next week. Users of io.js v3 are encouraged to migrate to Node.js v4 as a matter of priority.
Common Vulnerability Scoring System (CVSS) v3 Base Score:
|Base Score:||5.9 (Medium)|
|Attack Vector:||Network (AV:N)|
|Attack Complexity:||Medium (AC:H)|
|Privileges Required:||None (PR:N)|
|User Interaction:||None (UI:N)|
|Scope of Impact:||Unchanged (S:U)|
|Confidentiality Impact:||None (C:N)|
|Integrity Impact:||None (I:N)|
|Availability Impact:||High (A:H)|
Action and updates
A new v4.1.2 release is available with appropriate fixes for this vulnerability along with disclosure of the details of the bug to allow for complete impact assessment by users. Download the new release at nodejs.org.
A new io.js v3.x release for users having trouble migrating to Node.js v4, however this release does not indicate continued official support of io.js release lines. You can find this update on iojs.org.
Contact and future updates
Please contact email@example.com if you wish to report a vulnerability in Node.js.