CVE-2024-30259
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
14/05/2024
Last modified:
27/01/2025
Description
FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves malformed `RTPS` packet, heap buffer overflow occurs on the subscriber. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.<br />
Impact
Base Score 3.x
8.20
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:* | 2.6.8 (excluding) | |
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:* | 2.10.0 (including) | 2.10.4 (excluding) |
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:* | 2.13.0 (including) | 2.13.5 (excluding) |
cpe:2.3:a:eprosima:fast_dds:2.14.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing
- https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662
- https://vimeo.com/907641887?share=copy
- https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing
- https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662
- https://vimeo.com/907641887?share=copy