Unrated severityNVD Advisory· Published May 13, 2024· Updated Aug 2, 2024
FastDDS heap buffer overflow when publisher sends malformed packet
CVE-2024-30259
Description
FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves malformed RTPS packet, heap buffer overflow occurs on the subscriber. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/viewmitrex_refsource_MISC
- github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662mitrex_refsource_CONFIRM
- vimeo.com/907641887mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.