### [CVE-2024-28231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28231) ![](https://img.shields.io/static/v1?label=Product&message=Fast-DDS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.6.8%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%3A%20Heap-based%20Buffer%20Overflow&color=brighgreen) ### Description eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8, manipulated DATA Submessage can cause a heap overflow error in the Fast-DDS process, causing the process to be terminated remotely. Additionally, the payload_size in the DATA Submessage packet is declared as uint32_t. When a negative number, such as -1, is input into this variable, it results in an Integer Overflow (for example, -1 gets converted to 0xFFFFFFFF). This eventually leads to a heap-buffer-overflow, causing the program to terminate. Versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8 contain a fix for this issue. ### POC #### Reference - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-9m2j-qw67-ph4w #### Github - https://github.com/NaInSec/CVE-LIST