The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://github.com/node-opcua/node-opcua/commit/7b5044b3f5866fbedc3efabd05e407352c07bd2f | third party advisory patch |
https://github.com/node-opcua/node-opcua/pull/1182 | third party advisory patch |
https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988725 | third party advisory patch |
https://github.com/node-opcua/node-opcua/commit/3fd46ec156e7718a506be41f3916310b6bdd0407 | vdb entry third party advisory patch |