CVE-2023-26151

Versions of the package asyncua before 0.9.96 are vulnerable to Denial of Service (DoS) such that an attacker can send a malformed packet and as a result, the server will enter into an infinite loop and consume excessive memory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freeopcua:opcua-asyncio:*:*:*:*:*:python:*:*

History

21 Nov 2024, 07:50

Type Values Removed Values Added
References () https://gist.github.com/artfire52/1540b234350795e0ecb4d672608dbec8 - Exploit, Third Party Advisory () https://gist.github.com/artfire52/1540b234350795e0ecb4d672608dbec8 - Exploit, Third Party Advisory
References () https://github.com/FreeOpcUa/opcua-asyncio/commit/f6603daa34a93a658f0e176cb0b9ee5a6643b262 - Patch () https://github.com/FreeOpcUa/opcua-asyncio/commit/f6603daa34a93a658f0e176cb0b9ee5a6643b262 - Patch
References () https://github.com/FreeOpcUa/opcua-asyncio/issues/1013 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/FreeOpcUa/opcua-asyncio/issues/1013 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/FreeOpcUa/opcua-asyncio/pull/1039 - Patch () https://github.com/FreeOpcUa/opcua-asyncio/pull/1039 - Patch
References () https://github.com/FreeOpcUa/opcua-asyncio/releases/tag/v0.9.96 - Product, Release Notes () https://github.com/FreeOpcUa/opcua-asyncio/releases/tag/v0.9.96 - Product, Release Notes
References () https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709 - Exploit, Patch, Third Party Advisory () https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709 - Exploit, Patch, Third Party Advisory
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.3

04 Oct 2023, 17:12

Type Values Removed Values Added
First Time Freeopcua
Freeopcua opcua-asyncio
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:freeopcua:opcua-asyncio:*:*:*:*:*:python:*:*
References (MISC) https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709 - (MISC) https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709 - Exploit, Patch, Third Party Advisory
References (MISC) https://github.com/FreeOpcUa/opcua-asyncio/commit/f6603daa34a93a658f0e176cb0b9ee5a6643b262 - (MISC) https://github.com/FreeOpcUa/opcua-asyncio/commit/f6603daa34a93a658f0e176cb0b9ee5a6643b262 - Patch
References (MISC) https://github.com/FreeOpcUa/opcua-asyncio/releases/tag/v0.9.96 - (MISC) https://github.com/FreeOpcUa/opcua-asyncio/releases/tag/v0.9.96 - Product, Release Notes
References (MISC) https://github.com/FreeOpcUa/opcua-asyncio/issues/1013 - (MISC) https://github.com/FreeOpcUa/opcua-asyncio/issues/1013 - Exploit, Issue Tracking, Third Party Advisory
References (MISC) https://github.com/FreeOpcUa/opcua-asyncio/pull/1039 - (MISC) https://github.com/FreeOpcUa/opcua-asyncio/pull/1039 - Patch
References (MISC) https://gist.github.com/artfire52/1540b234350795e0ecb4d672608dbec8 - (MISC) https://gist.github.com/artfire52/1540b234350795e0ecb4d672608dbec8 - Exploit, Third Party Advisory
CWE CWE-835

03 Oct 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-03 05:15

Updated : 2024-11-21 07:50


NVD link : CVE-2023-26151

Mitre link : CVE-2023-26151

CVE.ORG link : CVE-2023-26151


JSON object : View

Products Affected

freeopcua

  • opcua-asyncio
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')