First published: Fri Jul 21 2023(Updated: )
OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS crashes while parsing a malformed `PID_PROPERTY_LIST` in a DATA submessage during participant discovery. Attackers can remotely crash OpenDDS processes by sending a DATA submessage containing the malformed parameter to the known multicast port. This issue has been addressed in version 3.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Objectcomputing Opendds | =3.23.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37915 is a vulnerability in OpenDDS, an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS).
CVE-2023-37915 is considered to be a high severity vulnerability with a severity score of 7.5.
CVE-2023-37915 causes OpenDDS to crash while parsing a malformed `PID_PROPERTY_LIST` in a DATA submessage during participant discovery.
OpenDDS version 3.23.1 is affected by CVE-2023-37915.
Attackers can remotely crash OpenDDS processes by sending a DATA submessage with a malformed `PID_PROPERTY_LIST`.