Description
OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.
No analysis available yet.
Remediation
Vendor Solution
OCI recommends users update to version 3.18.1 of OpenDDS or later.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-24897 | OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code. |
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:23:48.608Z
Reserved: 2021-08-10T00:00:00.000Z
Link: CVE-2021-38445
Updated: 2024-08-04T01:44:22.436Z
Status : Modified
Published: 2022-05-05T17:15:09.687
Modified: 2024-11-21T06:17:07.027
Link: CVE-2021-38445
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD