Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

DoS Vulnerability Patched in Node.js

The stable channel of Node.js has been updated to version 0.12.6. The latest version of the platform fixes a vulnerability that can be exploited for denial-of-service (DoS) attacks.

The vulnerability, which impacts all Buffer to String conversions, is caused by an out-of-band write in V8’s utf-8 decoder.

The stable channel of Node.js has been updated to version 0.12.6. The latest version of the platform fixes a vulnerability that can be exploited for denial-of-service (DoS) attacks.

The vulnerability, which impacts all Buffer to String conversions, is caused by an out-of-band write in V8’s utf-8 decoder.

“This is an important security update as this bug can be used to cause a denial of service attack,” the developers wrote in the release notes.

Last month, the Node 0.10.39 maintenance release was made available to upgrade OpenSSL to version 1.0.1o. The OpenSSL updates addresses several vulnerabilities, including two issues that affect Node.js.

One of the OpenSSL issues impacting Node.js is Logjam, a bug that can be leveraged via man-in-the-middle (MitM) attacks to downgrade TLS connections to 512-bit export-grade cryptography. The second issue is a DoS vulnerability caused by the way ECParameters structures are handled (CVE-2015-1788).

Node.js is an asynchronous event-driven framework designed for building scalable network applications. The platform has been used by some of the world’s largest enterprise solutions vendors, including IBM, Amazon, Microsoft, Oracle, and CA Technologies.

The use of an event-driven, non-blocking I/O model makes Node.js a lightweight and efficient platform that is ideal for data-intensive real-time applications that run across distributed devices. However, the use of a single-threaded event loop means that Node.js is not recommended for CPU intensive applications and ones that involve heavy lifting.

In a presentation at the recent Infosecurity Europe conference, Helen Bravo, head of product management at Checkmarx, explained that the single thread architecture makes Node.js highly vulnerable to DoS attacks.

Advertisement. Scroll to continue reading.

In addition, Node.js is also vulnerable to a type of attack known as regular expression denial-of-service (ReDoS), which exploits the fact that regular expression implementations can encounter situations that cause them to work very slowly.

ReDoS attacks against Node.js applications are possible when input length, structure, and permitted characters are not properly validated.

Input validation is also essential for protecting Node.js applications against SQL injection attacks, Bravo noted.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

Mike Byron has been named Chief Financial Officer (CFO) at Exabeam.

Ex-GitHub chief technology officer Mike Hanley has joined GM as CISO.

Network security and compliance assurance firm Titania has appointed Victoria Dimmick as CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.