The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) by sending a specifically crafted OPC UA message with a special OPC UA NodeID, when the requested memory allocation exceeds the v8’s memory limit.
References
Link | Resource |
---|---|
https://github.com/node-opcua/node-opcua/commit/7b5044b3f5866fbedc3efabd05e407352c07bd2f | Patch Third Party Advisory |
https://github.com/node-opcua/node-opcua/pull/1182 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988724 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2022-08-23T00:00:00
Updated: 2022-08-23T05:05:45
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-25231
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-08-23T05:15:07.873
Modified: 2022-08-26T13:01:18.860
Link: CVE-2022-25231
JSON object: View
Redhat Information
No data.
CWE