Filtered by vendor Objectcomputing Subscriptions
Filtered by product Opendds Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-52427 1 Objectcomputing 1 Opendds 2024-11-21 7.5 High
In OpenDDS through 3.27, there is a segmentation fault for a DataWriter with a large value of resource_limits.max_samples. NOTE: the vendor's position is that the product is not designed to handle a max_samples value that is too large for the amount of memory on the system.
CVE-2023-37915 1 Objectcomputing 1 Opendds 2024-11-21 7.5 High
OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS crashes while parsing a malformed `PID_PROPERTY_LIST` in a DATA submessage during participant discovery. Attackers can remotely crash OpenDDS processes by sending a DATA submessage containing the malformed parameter to the known multicast port. This issue has been addressed in version 3.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-23932 1 Objectcomputing 1 Opendds 2024-11-21 5.3 Medium
OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS applications that are exposed to untrusted RTPS network traffic may crash when parsing badly-formed input. This issue has been patched in version 3.23.1.
CVE-2021-38447 1 Objectcomputing 1 Opendds 2024-11-21 8.6 High
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition.
CVE-2021-38445 1 Objectcomputing 1 Opendds 2024-11-21 7 High
OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.
CVE-2021-38429 1 Objectcomputing 1 Opendds 2024-11-21 6.6 Medium
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition and information exposure.