|
Message-Id: <20160121075655.E2AEC6C0066@smtpvmsrv1.mitre.org> Date: Thu, 21 Jan 2016 02:56:55 -0500 (EST) From: cve-assign@...re.org To: kseifried@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE for node.js websockets (ws) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > https://nodesecurity.io/advisories/67 We currently feel that a CVE ID should not exist (unless an affected application is identified) because any related instances of security-relevant behavior would be site-specific, and therefore outside the scope of CVE. For example: https://gist.github.com/c0nrad/e92005446c480707a74a#gistcomment-1664152 https://nodejs.org/api/dgram.html#dgram_socket_send_buf_offset_length_port_address_callback suggests that the problem is that Node.js allows people to write incorrect server-side code in which there is a call to socket.send, socket.ping, or socket.pong with a numerical argument. However, the documentation states that the argument must be a Buffer object or string. Behavior in the case of a numerical argument seems to be undefined. The change seems to be a hardening measure in which numerical arguments are automatically converted to strings, thereby making it safer to execute a specific type of incorrect code. If incorrect server-side code actually exists in a product, then a CVE ID can be assigned. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWoI5eAAoJEL54rhJi8gl5JsAQAKBciZvNRlApccHSGlmNWMHR FTnjGchK1LxzJ9dyJ1Ap/kR3ZoYGj1HxeiajsCVu+gqkB71/N1V6kEKWfZtZBUI/ fQTEv1Ydadp8E5apigN5+bGf2mX+ahRZjfr2mJn/uoI/3tXcX8JUlduR1r162xmJ 4641oTYzh5UkNYJPBFeCPwjsCqqVHsSeBoftifMXhdSMP06qJYQE4Bxu8kuMRNQj ZwonpjKXAK86+qiM67Ic+ndxB3u/KNITqp++wsWVZBefmaDzsSsAf0K3kxSckX02 ngQi7/8MeHCZyTU3lLGsr7EUzb69RHHhPlE5bRRfE12mZi07htRu4IR4jzJNcNYg wEPzLp+irLY4oF/RplysEj0jf2j952xTQGD0HfoqGPsgK9EY2Z+O6s+GEJJF94hS b53sAtwSSZolXT7sSRSAbN7YAB1me+PN8AUaCKY8VXwJD3O4dYxsee1jTrx9BEqc hyst7ADv2fhqL5nXdUdOXunUmwTqy4oNQXNTVyRIGsfu3Kllk6AO9bdX73JHHSAl zmY2ruUKyGG2HCMLvBwCZ7YEM5oTF5UrGSvBcyWiLMA/55okt+a2TxMGR2Ne8/S3 pNV97DHNb38NQhhwSMbWKcezh2FK1lAnQnM4xxe5MAR+al3TOfSQoS39lmxLuIdg dBrwTilumCdT13FjYkhf =hyHR -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.