{"containers":{"cna":{"affected":[{"product":"Node.js","vendor":"Node.js","versions":[{"status":"affected","version":"All versions prior to 6.17.0"},{"status":"affected","version":"All versions prior to 8.15.1"},{"status":"affected","version":"All versions prior to 10.15.2"},{"status":"affected","version":"All versions prior to 11.10.1"}]}],"datePublic":"2019-02-28T00:00:00.000Z","descriptions":[{"lang":"en","value":"In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-400","description":"CWE-400: Uncontrolled Resource Consumption / Denial of Service","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-03-20T20:06:11.000Z","orgId":"386269d4-a6c6-4eaa-bf8e-bc0b0d010558","shortName":"nodejs"},"references":[{"tags":["x_refsource_MISC"],"url":"https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/"},{"name":"openSUSE-SU-2019:1076","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html"},{"name":"openSUSE-SU-2019:1173","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html"},{"name":"openSUSE-SU-2019:1211","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00059.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20190502-0008/"},{"name":"RHSA-2019:1821","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:1821"},{"name":"GLSA-202003-48","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"https://security.gentoo.org/glsa/202003-48"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve-request@iojs.org","ID":"CVE-2019-5737","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Node.js","version":{"version_data":[{"version_value":"All versions prior to 6.17.0"},{"version_value":"All versions prior to 8.15.1"},{"version_value":"All versions prior to 10.15.2"},{"version_value":"All versions prior to 11.10.1"}]}}]},"vendor_name":"Node.js"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-400: Uncontrolled Resource Consumption / Denial of Service"}]}]},"references":{"reference_data":[{"name":"https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/","refsource":"MISC","url":"https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/"},{"name":"openSUSE-SU-2019:1076","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html"},{"name":"openSUSE-SU-2019:1173","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html"},{"name":"openSUSE-SU-2019:1211","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00059.html"},{"name":"https://security.netapp.com/advisory/ntap-20190502-0008/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20190502-0008/"},{"name":"RHSA-2019:1821","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:1821"},{"name":"GLSA-202003-48","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/202003-48"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T20:01:52.386Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/"},{"name":"openSUSE-SU-2019:1076","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html"},{"name":"openSUSE-SU-2019:1173","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html"},{"name":"openSUSE-SU-2019:1211","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00059.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20190502-0008/"},{"name":"RHSA-2019:1821","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:1821"},{"name":"GLSA-202003-48","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"https://security.gentoo.org/glsa/202003-48"}]}]},"cveMetadata":{"assignerOrgId":"386269d4-a6c6-4eaa-bf8e-bc0b0d010558","assignerShortName":"nodejs","cveId":"CVE-2019-5737","datePublished":"2019-03-28T16:20:28.000Z","dateReserved":"2019-01-09T00:00:00.000Z","dateUpdated":"2024-08-04T20:01:52.386Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}