asyncua@0.9.9 vulnerabilities
Pure Python OPC-UA client and server library
-
latest version
1.1.5
-
latest non vulnerable version
-
first published
6 years ago
-
latest version published
4 months ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the asyncua package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Loop with Unreachable Exit Condition ('Infinite Loop') such that an attacker can send a malformed packet and as a result, the server will enter into an infinite loop and consume excessive memory. Note: When the attack is performed, no other client is able to reach the server. For a device with limited resources, it can lead to a crash of the device. How to fix Loop with Unreachable Exit Condition ('Infinite Loop')? Upgrade |
[,0.9.96)
|
Affected versions of this package are vulnerable to Improper Authentication such that it is possible to access Address Space without encryption and authentication. Note: This issue is a result of missing checks for services that require an active session. How to fix Improper Authentication? Upgrade |
[,0.9.96)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the How to fix Denial of Service (DoS)? Upgrade |
[,0.9.96)
|