Vulnerability Description
OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS applications that are exposed to untrusted RTPS network traffic may crash when parsing badly-formed input. This issue has been patched in version 3.23.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Objectcomputing | Opendds | < 3.23.1 |
Related Weaknesses (CWE)
References
- https://github.com/OpenDDS/OpenDDS/releases/tag/DDS-3.23.1Release NotesThird Party Advisory
- https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-8wvq-25f5-f8h4PatchThird Party Advisory
- https://github.com/OpenDDS/OpenDDS/releases/tag/DDS-3.23.1Release NotesThird Party Advisory
- https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-8wvq-25f5-f8h4PatchThird Party Advisory
FAQ
What is CVE-2023-23932?
CVE-2023-23932 is a vulnerability with a CVSS score of 5.3 (MEDIUM). OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS applications that are exposed to untrusted RTPS network traffic may crash whe...
How severe is CVE-2023-23932?
CVE-2023-23932 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-23932?
Check the references section above for vendor advisories and patch information. Affected products include: Objectcomputing Opendds.