OPC UA .NET Standard Stack 1.04.368 allows remote attacker to cause a crash via a crafted message that triggers excessive memory allocation.
References
Link | Resource |
---|---|
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29863.pdf | Patch Vendor Advisory |
https://opcfoundation.org/security/ | Vendor Advisory |
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29863.pdf | Patch Vendor Advisory |
https://opcfoundation.org/security/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29863.pdf - Patch, Vendor Advisory | |
References | () https://opcfoundation.org/security/ - Vendor Advisory |
Information
Published : 2022-06-16 18:15
Updated : 2024-11-21 06:59
NVD link : CVE-2022-29863
Mitre link : CVE-2022-29863
CVE.ORG link : CVE-2022-29863
JSON object : View
Products Affected
opcfoundation
- ua_.net_standard_stack
CWE
CWE-770
Allocation of Resources Without Limits or Throttling