-
CVSS Score
-The vulnerability stemmed from missing chunk size/count limitations in message processing. The patch added: 1) maxChunkCount/maxMessageSize checks in MessageBuilderBase 2) maxChunkSize validation in PacketAssembler 3) Transport limit propagation to MessageBuilder in SecureChannel layers. The vulnerable functions directly handled chunk processing without these critical resource controls, enabling DoS via oversized/unlimited chunks.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| node-opcua | npm | < 2.74.0 | 2.74.0 |