Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlxOTQtdjdjaC1teHF3

Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.

Permalink: https://github.com/advisories/GHSA-9q94-v7ch-mxqw
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlxOTQtdjdjaC1teHF3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-9q94-v7ch-mxqw, CVE-2020-8867
References: Repository: https://github.com/OPCFoundation/UA-.NETStandard
Blast Radius: 1.0

Affected Packages

nuget:OPCFoundation.NetStandard.Opc.Ua
Dependent packages: 0
Dependent repositories: 0
Downloads: 2,610,755 total
Affected Version Ranges: <= 1.4.358.30
Fixed in: 1.4.359.31
All affected versions: 0.4.0, 0.4.1, 0.4.3, 0.4.4, 0.4.5, 1.3.348, 1.3.349, 1.3.350, 1.4.35-3.13, 1.4.35-3.14, 1.4.35-3.15, 1.4.35-4.16-preview, 1.4.35-4.18-preview, 1.4.35-4.19-preview, 1.4.35-4.20-preview, 1.4.35-4.21, 1.4.35-4.23, 1.4.35-5.24-preview, 1.4.35-5.25, 1.4.35-5.26, 1.4.35-6.27, 1.4.35-7.28, 1.4.35-8.30
All unaffected versions: