Eclipse Foundation Mosquitto vulnerabilities

4 known vulnerabilities affecting eclipse_foundation/mosquitto.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2024-10525HIGHCVSS 7.2≥ 1.3.2, ≤ 2.0.182024-10-30
CVE-2024-10525 [HIGH] CWE-122 CVE-2024-10525: In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBAC In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.
cvelistv5nvd
CVE-2024-3935MEDIUMCVSS 6.0≥ 2.0.0, ≤ 2.0.182024-10-30
CVE-2024-3935 [MEDIUM] CWE-415 CVE-2024-3935: In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to crea In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash
cvelistv5nvd
CVE-2024-8376HIGHCVSS 7.2v2.0.182024-10-11
CVE-2024-8376 [HIGH] CWE-401 CVE-2024-8376: In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fau In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fault or heap-use-after-free by sending specific sequences of "CONNECT", "DISCONNECT", "SUBSCRIBE", "UNSUBSCRIBE" and "PUBLISH" packets.
cvelistv5nvd
CVE-2017-7650MEDIUMCVSS 6.5v0.15 to 1.4.11 inclusive2017-09-11
CVE-2017-7650 [MEDIUM] CWE-287 CVE-2017-7650: In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/cl In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.
cvelistv5nvd