CVE-2024-30259

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
14/05/2024
Last modified:
27/01/2025

Description

FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves malformed `RTPS` packet, heap buffer overflow occurs on the subscriber. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.<br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:* 2.6.8 (excluding)
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:* 2.10.0 (including) 2.10.4 (excluding)
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:* 2.13.0 (including) 2.13.5 (excluding)
cpe:2.3:a:eprosima:fast_dds:2.14.0:*:*:*:*:*:*:*