Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTc4MnAtNTN3cS1jeG1q
High severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
Permalink: https://github.com/advisories/GHSA-782p-53wq-cxmjJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTc4MnAtNTN3cS1jeG1q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 6 years ago
Updated: almost 2 years ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Percentage: 0.00525
EPSS Percentile: 0.77505
Identifiers: GHSA-782p-53wq-cxmj, CVE-2018-12086
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-12086
- https://github.com/advisories/GHSA-782p-53wq-cxmj
- https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdf
- https://www.debian.org/security/2018/dsa-4359
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
- http://www.securityfocus.com/bid/105538
- http://www.securitytracker.com/id/1041909
Affected Packages
nuget:OPCFoundation.NetStandard.Opc.Ua
Dependent packages: 41Dependent repositories: 0
Downloads: 3,190,104 total
Affected Version Ranges: <= 1.4.352.12
Fixed in: 1.4.353.15
All affected versions: 0.4.0, 0.4.1, 0.4.3, 0.4.4, 0.4.5, 1.3.348, 1.3.349, 1.3.350
All unaffected versions: