Lucene search

K
githubGitHub Advisory DatabaseGHSA-MFPJ-3QHM-976M
HistoryAug 24, 2022 - 12:00 a.m.

Uncontrolled Resource Consumption in asyncua and opcua

2022-08-2400:00:31
CWE-400
CWE-770
GitHub Advisory Database
github.com
11
asyncua
opcua
denial of service

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

46.6%

All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.

Affected configurations

Vulners
Node
asyncua_projectasyncuaRange0.9.95python
OR
opcua_projectopcuaRange0.98.13python
VendorProductVersionCPE
asyncua_projectasyncua*cpe:2.3:a:asyncua_project:asyncua:*:*:*:*:*:python:*:*
opcua_projectopcua*cpe:2.3:a:opcua_project:opcua:*:*:*:*:*:python:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

46.6%