OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-24897 OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.
Fixes

Solution

OCI recommends users update to version 3.18.1 of OpenDDS or later.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00253}

epss

{'score': 0.00662}


Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:23:48.608Z

Reserved: 2021-08-10T00:00:00.000Z

Link: CVE-2021-38445

cve-icon Vulnrichment

Updated: 2024-08-04T01:44:22.436Z

cve-icon NVD

Status : Modified

Published: 2022-05-05T17:15:09.687

Modified: 2024-11-21T06:17:07.027

Link: CVE-2021-38445

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.