Skip to content

Memory Allocation with Excessive Size Value in OPCFoundation.NetStandard.Opc.Ua.Core

High severity GitHub Reviewed Published Jun 15, 2022 in OPCFoundation/UA-.NETStandard • Updated Jan 30, 2023

Package

nuget OPCFoundation.NetStandard.Opc.Ua.Core (NuGet)

Affected versions

<= 1.4.368.53

Patched versions

1.4.368.58

Description

A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception with a carefully crafted message.

References

Published by the National Vulnerability Database Jun 16, 2022
Published to the GitHub Advisory Database Jun 17, 2022
Reviewed Jun 17, 2022
Last updated Jan 30, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2022-29863

GHSA ID

GHSA-r7pq-3x6p-7jcm

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.