gsd-2023-27321
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-27321",
"id": "GSD-2023-27321"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-27321"
],
"id": "GSD-2023-27321",
"modified": "2023-12-13T01:20:56.048886Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-27321",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,1.4.371.86)",
"affected_versions": "All versions before 1.4.371.86",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2023-05-05",
"description": "This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that allows\nremote attackers to send malicious requests that consume all memory available to the server. https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-27321.pdf",
"fixed_versions": [
"1.4.371.86"
],
"identifier": "CVE-2023-27321",
"identifiers": [
"GHSA-vpf7-r2fv-75m9",
"CVE-2023-27321"
],
"not_impacted": "All versions starting from 1.4.371.86",
"package_slug": "nuget/OPCFoundation.NetStandard.Opc.Ua.Server",
"pubdate": "2023-05-05",
"solution": "Upgrade to version 1.4.371.86 or above.",
"title": "Uncontrolled Resource Consumption in OPC UA .NET Standard Reference Server",
"urls": [
"https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vpf7-r2fv-75m9",
"https://github.com/advisories/GHSA-vpf7-r2fv-75m9"
],
"uuid": "9ec9bd54-f09f-4a82-a982-4363b7ba102a"
}
]
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…