Versions of the package asyncua before 0.9.96 are vulnerable to Denial of Service (DoS) such that an attacker can send a malformed packet and as a result, the server will enter into an infinite loop and consume excessive memory.
References
Link | Resource |
---|---|
https://gist.github.com/artfire52/1540b234350795e0ecb4d672608dbec8 | Exploit Third Party Advisory |
https://github.com/FreeOpcUa/opcua-asyncio/commit/f6603daa34a93a658f0e176cb0b9ee5a6643b262 | Patch |
https://github.com/FreeOpcUa/opcua-asyncio/issues/1013 | Exploit Issue Tracking Third Party Advisory |
https://github.com/FreeOpcUa/opcua-asyncio/pull/1039 | Patch |
https://github.com/FreeOpcUa/opcua-asyncio/releases/tag/v0.9.96 | Product Release Notes |
https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709 | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2023-10-03T05:00:01.093Z
Updated: 2023-10-03T05:00:01.093Z
Reserved: 2023-02-20T10:28:48.929Z
Link: CVE-2023-26151
JSON object: View
NVD Information
Status : Modified
Published: 2023-10-03T05:15:50.507
Modified: 2023-11-07T04:09:29.060
Link: CVE-2023-26151
JSON object: View
Redhat Information
No data.