Описание
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | 2.6.6-1~ubuntu14.04.0 |
| devel | not-affected | 2.6.6-1~ubuntu14.04.0 |
| esm-apps/bionic | not-affected | 2.6.6-1~ubuntu14.04.0 |
| esm-apps/focal | not-affected | 2.6.6-1~ubuntu14.04.0 |
| esm-apps/xenial | not-affected | 2.6.6-1~ubuntu14.04.0 |
| esm-infra-legacy/trusty | not-affected | 2.6.6-1~ubuntu14.04.0 |
| focal | not-affected | 2.6.6-1~ubuntu14.04.0 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | not-affected | 2.6.6-1~ubuntu14.04.0 |
Показывать по
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
Buffer overflow in OPC UA applications allows remote attackers to trig ...
High severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua
Уязвимость реализаций спецификации передачи данных в промышленных сетях OPC UA, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
5 Medium
CVSS2
7.5 High
CVSS3