| Vulnerability Name: | CVE-2014-9748 (CCN-114710) | ||||||||||||||||||||
| Assigned: | 2015-10-02 | ||||||||||||||||||||
| Published: | 2016-06-13 | ||||||||||||||||||||
| Updated: | 2022-08-12 | ||||||||||||||||||||
| Summary: | The uv_rwlock_t fallback implementation for Windows XP and Server 2003 in libuv before 1.7.4 does not properly prevent threads from releasing the locks of other threads, which allows attackers to cause a denial of service (deadlock) or possibly have unspecified other impact by leveraging a race condition. | ||||||||||||||||||||
| CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
2.6 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
| Vulnerability Type: | CWE-362 | ||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2014-9748 Source: CCN Type: IBM Security Bulletin 1986384 (SDK for Node.js) IBM SDK for Node.js may be affected by CVE-2014-9748 Source: CCN Type: IBM Security Bulletin 1990841 (Business Process Manager Advanced) Security vulnerabilities in IBM SDK for Node.js might affect IBM Business Process Manager (BPM) Configuration Editor (CVE-2014-9748, CVE-2016-1669) Source: XF Type: UNKNOWN libuv-cve20149748-dos(114710) Source: CCN Type: libuv GIT Repository windows: xp rwlock fallback is unsound #515 Source: MISC Type: Patch, Third Party Advisory https://github.com/libuv/libuv/issues/515 Source: MISC Type: Patch, Third Party Advisory https://github.com/libuv/libuv/pull/516 Source: MISC Type: Third Party Advisory https://github.com/nodejs/node/pull/2723 Source: MISC Type: Exploit, Third Party Advisory https://groups.google.com/forum/#!msg/libuv/KyNnGEXR0OA/NWb605ev2LUJ Source: MISC Type: Third Party Advisory https://groups.google.com/forum/#!topic/libuv/WO2cl9zasN8 Source: CCN Type: Node.js Blog, 2016-06-13 Security updates for all active release lines, June 2016 | ||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
| BACK | |||||||||||||||||||||