CVE-2024-30259Classic Buffer Overflow in Fast-dds

Severity
7.5HIGHNVD
CNA8.2
EPSS
0.8%
top 25.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 14

Description

FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves malformed `RTPS` packet, heap buffer overflow occurs on the subscriber. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDeprosima/fast_dds2.10.02.10.4+3
CVEListV5eprosima/fast-dds< 2.6.8+3

🔴Vulnerability Details

2
OSV
CVE-2024-30259: FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group)2024-05-14
CVEList
FastDDS heap buffer overflow when publisher sends malformed packet2024-05-13

📋Vendor Advisories

1
Debian
CVE-2024-30259: fastdds - FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard ...2024
CVE-2024-30259 — Classic Buffer Overflow in Fast-dds | cvebase