CVE-2020-8265 vulnerability in nodejs and Other Products
Published on January 6, 2021
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2020-8265 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2020-8265
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-8265 are published in these products:
Affected Versions
NodeJS Node:- Version 4.0 and below 4.* is affected.
- Version 5.0 and below 5.* is affected.
- Version 6.0 and below 6.* is affected.
- Version 7.0 and below 7.* is affected.
- Version 8.0 and below 8.* is affected.
- Version 9.0 and below 9.* is affected.
- Version 10.0 and below 10.23.1 is affected.
- Version 11.0 and below 11.* is affected.
- Version 12.0 and below 12.20.1 is affected.
- Version 13.0 and below 13.* is affected.
- Version 14.0 and below 14.15.4 is affected.
- Version 15.0 and below 15.5.1 is affected.
Exploit Probability
EPSS
1.08%
Percentile
77.60%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.