CVE-2022-21208

The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.
Configurations

Configuration 1 (hide)

cpe:2.3:a:node-opcua_project:node-opcua:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:44

Type Values Removed Values Added
References () https://github.com/node-opcua/node-opcua/commit/33ca3bab4ab781392a2f8d8f5a14de9a0aa0e410 - Patch, Third Party Advisory () https://github.com/node-opcua/node-opcua/commit/33ca3bab4ab781392a2f8d8f5a14de9a0aa0e410 - Patch, Third Party Advisory
References () https://github.com/node-opcua/node-opcua/commit/dbcb5d5191118c22ee9c89332a94b94e6553d76b - Patch, Third Party Advisory () https://github.com/node-opcua/node-opcua/commit/dbcb5d5191118c22ee9c89332a94b94e6553d76b - Patch, Third Party Advisory
References () https://github.com/node-opcua/node-opcua/pull/1149 - Patch, Third Party Advisory () https://github.com/node-opcua/node-opcua/pull/1149 - Patch, Third Party Advisory
References () https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723 - Third Party Advisory () https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723 - Third Party Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-400 CWE-1284

26 Aug 2022, 12:52

Type Values Removed Values Added
CPE cpe:2.3:a:node-opcua_project:mode-opcua:*:*:*:*:*:node.js:*:* cpe:2.3:a:node-opcua_project:node-opcua:*:*:*:*:*:node.js:*:*

25 Aug 2022, 15:01

Type Values Removed Values Added
CWE CWE-400
References (CONFIRM) https://github.com/node-opcua/node-opcua/pull/1149 - (CONFIRM) https://github.com/node-opcua/node-opcua/pull/1149 - Patch, Third Party Advisory
References (CONFIRM) https://github.com/node-opcua/node-opcua/commit/33ca3bab4ab781392a2f8d8f5a14de9a0aa0e410 - (CONFIRM) https://github.com/node-opcua/node-opcua/commit/33ca3bab4ab781392a2f8d8f5a14de9a0aa0e410 - Patch, Third Party Advisory
References (CONFIRM) https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723 - (CONFIRM) https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723 - Third Party Advisory
References (CONFIRM) https://github.com/node-opcua/node-opcua/commit/dbcb5d5191118c22ee9c89332a94b94e6553d76b - (CONFIRM) https://github.com/node-opcua/node-opcua/commit/dbcb5d5191118c22ee9c89332a94b94e6553d76b - Patch, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:node-opcua_project:mode-opcua:*:*:*:*:*:node.js:*:*

23 Aug 2022, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-23 05:15

Updated : 2024-11-21 06:44


NVD link : CVE-2022-21208

Mitre link : CVE-2022-21208

CVE.ORG link : CVE-2022-21208


JSON object : View

Products Affected

node-opcua_project

  • node-opcua
CWE
CWE-1284

Improper Validation of Specified Quantity in Input