Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlxOTQtdjdjaC1teHF3
Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.
Permalink: https://github.com/advisories/GHSA-9q94-v7ch-mxqwJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlxOTQtdjdjaC1teHF3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 3 years ago
Updated: almost 2 years ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Percentage: 0.01776
EPSS Percentile: 0.88503
Identifiers: GHSA-9q94-v7ch-mxqw, CVE-2020-8867
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-8867
- https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf
- https://www.zerodayinitiative.com/advisories/ZDI-20-536/
- https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.359.31
- https://github.com/advisories/GHSA-9q94-v7ch-mxqw
Blast Radius: 1.0
Affected Packages
nuget:OPCFoundation.NetStandard.Opc.Ua
Dependent packages: 41Dependent repositories: 0
Downloads: 3,190,104 total
Affected Version Ranges: <= 1.4.358.30
Fixed in: 1.4.359.31
All affected versions: 0.4.0, 0.4.1, 0.4.3, 0.4.4, 0.4.5, 1.3.348, 1.3.349, 1.3.350, 1.4.35-3.13, 1.4.35-3.14, 1.4.35-3.15, 1.4.35-4.16-preview, 1.4.35-4.18-preview, 1.4.35-4.19-preview, 1.4.35-4.20-preview, 1.4.35-4.21, 1.4.35-4.23, 1.4.35-5.24-preview, 1.4.35-5.25, 1.4.35-5.26, 1.4.35-6.27, 1.4.35-7.28, 1.4.35-8.30
All unaffected versions: