CVE-2017-16129

NameCVE-2017-16129
DescriptionThe HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-superagent (PTS)buster0.20.0+dfsg-2fixed
bullseye6.1.0-4fixed
trixie, sid, bookworm8.0.5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-superagentsourcejessie(unfixed)end-of-life
node-superagentsourcestretch0.20.0+dfsg-1+deb9u2
node-superagentsource(unstable)0.20.0+dfsg-2

Notes

[jessie] - node-superagent <end-of-life> (Nodejs in jessie not covered by security support)
https://github.com/visionmedia/superagent/issues/1259
https://nodesecurity.io/advisories/479

Search for package or bug name: Reporting problems