{"id":"PYSEC-2023-190","details":"Versions of the package asyncua before 0.9.96 are vulnerable to Denial of Service (DoS) such that an attacker can send a malformed packet and as a result, the server will enter into an infinite loop and consume excessive memory.","aliases":["CVE-2023-26151","GHSA-gfvq-mxw3-mfq3"],"modified":"2023-11-01T05:01:30.795518Z","published":"2023-10-03T05:15:00Z","references":[{"type":"WEB","url":"https://gist.github.com/artfire52/1540b234350795e0ecb4d672608dbec8"},{"type":"WEB","url":"https://github.com/FreeOpcUa/opcua-asyncio/releases/tag/v0.9.96"},{"type":"WEB","url":"https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709"},{"type":"REPORT","url":"https://github.com/FreeOpcUa/opcua-asyncio/issues/1013"},{"type":"FIX","url":"https://github.com/FreeOpcUa/opcua-asyncio/pull/1039"},{"type":"FIX","url":"https://github.com/FreeOpcUa/opcua-asyncio/commit/f6603daa34a93a658f0e176cb0b9ee5a6643b262"}],"affected":[{"package":{"name":"asyncua","ecosystem":"PyPI","purl":"pkg:pypi/asyncua"},"ranges":[{"type":"GIT","repo":"https://github.com/FreeOpcUa/opcua-asyncio","events":[{"introduced":"0"},{"fixed":"f6603daa34a93a658f0e176cb0b9ee5a6643b262"}]},{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.96"}]}],"versions":["0.5.0","0.5.1","0.6.0","0.6.1","0.8.0","0.8.1","0.8.2","0.8.3","0.8.4","0.9.0","0.9.1","0.9.10","0.9.11","0.9.12","0.9.14","0.9.2","0.9.3","0.9.6","0.9.8","0.9.9","0.9.90","0.9.91","0.9.92","0.9.93","0.9.94","0.9.95"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/asyncua/PYSEC-2023-190.yaml"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}