nodejs node-js CVE-2020-8265 vulnerability in nodejs and Other Products
Published on January 6, 2021

product logo product logo product logo product logo product logo product logo
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2020-8265 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2020-8265

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-8265 are published in these products:

 
 
 
 
 
 

Affected Versions

NodeJS Node:

Exploit Probability

EPSS
1.08%
Percentile
77.60%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.