CVE-2023-46809
Published: February 16, 2024Last modified: May 22, 2024
Description
Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.4 |
Attack Vector | NETWORK |
Attack complexity | HIGH |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | NONE |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | nodejs | Fixed (18.19.1-r0) |
Stream | nodejs | Fixed (20.11.1-r0) | |
Liberica NIK | 23 (JDK 17) | standard (nodejs) | Fixed (23.0.4+1) |
23 (JDK 21) | standard (nodejs) | Fixed (23.1.3+2) | |
24 (JDK 22) | nodejs | Fixed (24.0.1+1) |
References
- https://nodejs.org/en/blog/vulnerability/february-2024-security-releases
- https://nodejs.org/en/blog/vulnerability/february-2024-security-releases#nodejs-is-vulnerable-to-the-marvin-attack-timing-variant-of-the-bleichenbacher-attack-against-pkcs1-v15-padding-cve-2023-46809---medium