Description
ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.
Remediation
References
https://github.com/nodejs/node/issues/7388
https://nodesecurity.io/advisories/120
Related Vulnerabilities
CVE-2019-12043 Vulnerability in maven package org.webjars.bowergithub.jonschlinkert:remarkable
CVE-2018-14732 Vulnerability in npm package webpack-dev-server
CVE-2022-36915 Vulnerability in maven package org.jenkins-ci.plugins:android-signing
CVE-2020-36189 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2015-0226 Vulnerability in maven package org.apache.ws.security:wss4j