First published: Tue Jan 26 2021(Updated: )
Some parsing functions in the affected product do not check the return value of malloc and the thread handling the message is forced to close, which may lead to a denial-of-service condition on the OPC UA Tunneller (versions prior to 6.3.0.8233).
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Opc Ua Tunneller | <6.3.0.8233 | |
Matrikon, a subsidiary of Honeywell OPC UA Tunneller | <6.3.0.8233 | 6.3.0.8233 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27274 is a vulnerability in the parsing functions of the Honeywell OPC UA Tunneller that can lead to a denial-of-service condition.
CVE-2020-27274 has a severity rating of 7.5, which is considered high.
CVE-2020-27274 affects versions prior to 6.3.0.8233 of the Honeywell OPC UA Tunneller.
The denial-of-service condition can be triggered when parsing functions in the affected product do not check the return value of malloc, leading to the forced closure of the thread handling the message.
Yes, the fix for CVE-2020-27274 is to update the Honeywell OPC UA Tunneller to version 6.3.0.8233 or later.