cve/2024/CVE-2024-30259.md

22 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-30259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30259)
![](https://img.shields.io/static/v1?label=Product&message=Fast-DDS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3D%202.14.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%3A%20Heap-based%20Buffer%20Overflow&color=brighgreen)
### Description
FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves malformed `RTPS` packet, heap buffer overflow occurs on the subscriber. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.
### POC
#### Reference
- https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing
2024-06-09 00:33:16 +00:00
- https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing
2024-05-25 21:48:12 +02:00
- https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662
2024-06-09 00:33:16 +00:00
- https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.