Objectcomputing

Opendds

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 23.12.2025 16:16:23
  • Zuletzt bearbeitet 06.01.2026 17:41:11

An integer overflow in the RTPS protocol implementation of OpenDDS DDS before v3.33.0 allows attackers to cause a Denial of Service (DoS) via a crafted message.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 11.04.2024 06:15:06
  • Zuletzt bearbeitet 17.06.2025 20:51:29

An issue was discovered in OpenDDS commit b1c534032bb62ad4ae32609778de6b8d6c823a66, allows a local attacker to cause a denial of service and obtain sensitive information via the max_samples parameter within the DataReaderQoS component.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 11.02.2024 04:15:08
  • Zuletzt bearbeitet 21.11.2024 08:39:43

In OpenDDS through 3.27, there is a segmentation fault for a DataWriter with a large value of resource_limits.max_samples. NOTE: the vendor's position is that the product is not designed to handle a max_samples value that is too large for the amount ...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 21.07.2023 21:15:11
  • Zuletzt bearbeitet 21.11.2024 08:12:27

OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS crashes while parsing a malformed `PID_PROPERTY_LIST` in a DATA submessage during participant discovery. Attackers can remotely...

  • EPSS 0.41%
  • Veröffentlicht 03.02.2023 21:15:11
  • Zuletzt bearbeitet 21.11.2024 07:47:07

OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS applications that are exposed to untrusted RTPS network traffic may crash when parsing badly-formed input. This issue has been ...

  • EPSS 0.06%
  • Veröffentlicht 05.05.2022 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:17:04

OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition and information exposure.

  • EPSS 0.7%
  • Veröffentlicht 05.05.2022 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:17:07

OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.

  • EPSS 0.1%
  • Veröffentlicht 05.05.2022 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:17:07

OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition.