OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS crashes while parsing a malformed `PID_PROPERTY_LIST` in a DATA submessage during participant discovery. Attackers can remotely crash OpenDDS processes by sending a DATA submessage containing the malformed parameter to the known multicast port. This issue has been addressed in version 3.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-v5pp-7prc-5xq9 | Exploit Vendor Advisory |
https://github.com/OpenDDS/OpenDDS/releases/tag/DDS-3.25 | Release Notes |
Configurations
History
01 Aug 2023, 15:47
Type | Values Removed | Values Added |
---|---|---|
First Time |
Objectcomputing opendds
Objectcomputing |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:objectcomputing:opendds:3.23.1:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/OpenDDS/OpenDDS/releases/tag/DDS-3.25 - Release Notes | |
References | (MISC) https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-v5pp-7prc-5xq9 - Exploit, Vendor Advisory |
21 Jul 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-21 21:15
Updated : 2023-08-01 15:47
NVD link : CVE-2023-37915
Mitre link : CVE-2023-37915
JSON object : View
Products Affected
objectcomputing
- opendds
CWE