CVE-2025-62799
Severity CVSS v4.0:
HIGH
Type:
CWE-122
Heap-based Buffer Overflow
Publication date:
03/02/2026
Last modified:
03/02/2026
Description
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group<br />
). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un<br />
authenticated sender can transmit a single malformed RTPS DATA_FRAG packet where `fragmentSize` and `sampleSize` are craft<br />
ed to violate internal assumptions. Due to a 4-byte alignment step during fragment metadata initialization, the code write<br />
s past the end of the allocated payload buffer, causing immediate crash (DoS) and potentially enabling memory corruption (<br />
RCE risk). Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
References to Advisories, Solutions, and Tools
- https://github.com/eProsima/Fast-DDS/commit/0c3824ef4991628de5dfba240669dc6172d63b46
- https://github.com/eProsima/Fast-DDS/commit/955c8a15899dc6eb409e080fe7dc89e142d5a514
- https://github.com/eProsima/Fast-DDS/commit/d6dd58f4ecd28cd1c3bc4ef0467be9110fa94659
- https://security-tracker.debian.org/tracker/CVE-2025-62799



