The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a "catastrophic backtracking issue for the em inline rule," aka a "regular expression denial of service (ReDoS)."
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/04/20/11 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/ | Mailing List Third Party Advisory |
https://nodesecurity.io/advisories/23 | Broken Link Patch Vendor Advisory |
https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-01-23 21:59
Updated : 2024-02-09 03:01
NVD link : CVE-2015-8854
Mitre link : CVE-2015-8854
CVE.ORG link : CVE-2015-8854
JSON object : View
Products Affected
marked_project
- marked
fedoraproject
- fedora
CWE
CWE-1333
Inefficient Regular Expression Complexity