OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS crashes while parsing a malformed `PID_PROPERTY_LIST` in a DATA submessage during participant discovery. Attackers can remotely crash OpenDDS processes by sending a DATA submessage containing the malformed parameter to the known multicast port. This issue has been addressed in version 3.25. Users are advised to upgrade. There are no known workarounds for this vulnerability..This CVE has a CVSS3.1 score of 7.5 and a Base Severity of HIGH.
Info | Details |
---|---|
CVE ID | CVE-2023-37915 |
CVE State | PUBLISHED |
BaseScore | 7.5 |
BaseSeverity | HIGH |
VectorString | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Version | NA |
References for CVE-2023-37915 :
https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-v5pp-7prc-5xq9
https://github.com/OpenDDS/OpenDDS/releases/tag/DDS-3.25
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NETWORK |
AttackComplexity(AC) | LOW |
PrivilegesRequired(PR) | NONE |
UserInteraction(UI) | NONE |
Scope(S) | UNCHANGED |
Confidentiality(C) | NONE |
Availability(A) | HIGH |
Integrity(I) | NONE |