First published: Thu May 05 2022(Updated: )
OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Objectcomputing Opendds | <3.18.1 | |
<0.8.0 | 0.8.0 | |
<2.4.0 | 2.4.0 | |
<3.18.1 | 3.18.1 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Real-Time Innovations (RTI) Connext DDS Professional and Connext DDS Secure: Versions 4.2x to 6.1.0 | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing RTI Connext DDS Micro | >=3.0.0 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing TwinOaks Computing CoreDX DDS | <5.9.1 | 5.9.1 |
OCI recommends users update to version 3.18.1 of OpenDDS or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-38445.
The severity of CVE-2021-38445 is critical with a severity value of 9.8.
The affected software for CVE-2021-38445 is OCI OpenDDS versions prior to 3.18.1.
CVE-2021-38445 is a vulnerability in OCI OpenDDS versions prior to 3.18.1 that allows an attacker to remotely execute arbitrary code due to improper handling of a length parameter.
Yes, there are references available for CVE-2021-38445. You can find them at the following links: [https://opendds.org/](https://opendds.org/) and [https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02](https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02).