cve/2022/CVE-2022-25903.md

18 lines
792 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-25903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25903)
![](https://img.shields.io/static/v1?label=Product&message=opcua&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%200.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20Service%20(DoS)&color=brighgreen)
### Description
The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the maximum allowed.
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988750
#### Github
- https://github.com/claroty/opcua-exploit-framework