{"id":"UBUNTU-CVE-2017-15896","details":"Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.","modified":"2025-07-17T16:53:29Z","published":"2017-12-11T21:29:00Z","withdrawn":"2025-07-18T16:44:13Z","upstream":["CVE-2017-15896"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15896"},{"type":"REPORT","url":"https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-15896"}],"affected":[{"package":{"name":"nodejs","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/nodejs@8.10.0~dfsg-2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.10.0~dfsg-2"}]}],"versions":["6.11.4~dfsg-1ubuntu1","6.11.4~dfsg-1ubuntu2","6.12.0~dfsg-1ubuntu1","6.12.0~dfsg-2ubuntu1","6.12.0~dfsg-2ubuntu2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"nodejs","binary_version":"8.10.0~dfsg-2"},{"binary_name":"nodejs-dbgsym","binary_version":"8.10.0~dfsg-2"},{"binary_name":"nodejs-dev","binary_version":"8.10.0~dfsg-2"},{"binary_name":"nodejs-doc","binary_version":"8.10.0~dfsg-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-15896.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]}