CVE-2019-10196

A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1567245 Issue Tracking Patch Third Party Advisory
https://www.npmjs.com/advisories/607 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:http-proxy-agent_project:http-proxy-agent:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

25 Mar 2021, 19:21

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*
cpe:2.3:a:http-proxy-agent_project:http-proxy-agent:*:*:*:*:*:node.js:*:*
cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 9.0
v3 : 9.8
References (MISC) https://www.npmjs.com/advisories/607 - (MISC) https://www.npmjs.com/advisories/607 - Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1567245 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1567245 - Issue Tracking, Patch, Third Party Advisory

19 Mar 2021, 20:21

Type Values Removed Values Added
New CVE

Information

Published : 2021-03-19 20:15

Updated : 2023-12-10 13:41


NVD link : CVE-2019-10196

Mitre link : CVE-2019-10196

CVE.ORG link : CVE-2019-10196


JSON object : View

Products Affected

redhat

  • software_collections
  • enterprise_linux

http-proxy-agent_project

  • http-proxy-agent

fedoraproject

  • fedora
CWE
CWE-665

Improper Initialization