The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the maximum allowed.
References
Link | Resource |
---|---|
https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988750 | Patch Third Party Advisory |
https://github.com/locka99/opcua/pull/216 | Third Party Advisory |
https://github.com/locka99/opcua/pull/216/commits/e75dada28a40c3fefc4aeee4cdc272e1b748f8dd | Patch Third Party Advisory |
Configurations
Information
Published : 2022-08-23 22:15
Updated : 2022-08-25 21:52
NVD link : CVE-2022-25903
Mitre link : CVE-2022-25903
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
opcua_project
- opcua