https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0249 | https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON). |
Github GHSA |
GHSA-8g7p-74h8-hg48 | Denial of Service in https-proxy-agent |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-17T04:25:44.584Z
Reserved: 2017-12-28T00:00:00
Link: CVE-2018-3739
No data.
Status : Modified
Published: 2018-06-07T02:29:08.973
Modified: 2024-11-21T04:05:59.100
Link: CVE-2018-3739
OpenCVE Enrichment
No data.
EUVD
Github GHSA