CVE-2020-36049
Summary
| CVE | CVE-2020-36049 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-01-08 00:15:00 UTC |
| Updated | 2021-07-21 11:39:00 UTC |
| Description | socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| fix: prevent DoS (OOM) via massive packets (#95) · socketio/socket.io-parser@dcb942d · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| SocketIO / EngineIO DoS | callerxyz |
MISC |
blog.caller.xyz |
Exploit, Third Party Advisory |
| GitHub - bcaller/kill-engine-io: DoS python-engineio / socketio via the long polling transport |
MISC |
github.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 982029 Nodejs (npm) Security Update for socket.io-parser (GHSA-xfhh-g9f5-x4m4)