Heap overflow in push_back_helper due to a CDR message
Description
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6, heap can be overflowed by providing a PID_PROPERTY_LIST parameter that contains a CDR string with length larger than the size of actual content. In eprosima::fastdds::dds::ParameterPropertyList_t::push_back_helper, memcpy is called to first copy the octet'ized length and then to copy the data into properties_.data. At the second memcpy, both data and size can be controlled by anyone that sends the CDR string to the discovery multicast port. This can remotely crash any Fast-DDS process. Versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6 contain a patch for this issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/eProsima/Fast-DDS/commit/349227005827e8a67a0406b823138b5068cc47dcmitrex_refsource_MISC
- github.com/eProsima/Fast-DDS/security/advisories/GHSA-j297-rg6j-m7hxmitrex_refsource_CONFIRM
- www.debian.org/security/2023/dsa-5481mitre
News mentions
0No linked articles in our index yet.