CVE-2019-11779

In Eclipse Mosquitto 1.5.0 to 1.6.5 inclusive, if a malicious MQTT client sends a SUBSCRIBE packet containing a topic that consists of approximately 65400 or more '/' characters, i.e. the topic hierarchy separator, then a stack overflow will occur.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*
cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

28 Oct 2021, 15:12

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
References (DEBIAN) https://www.debian.org/security/2019/dsa-4570 - (DEBIAN) https://www.debian.org/security/2019/dsa-4570 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00008.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00008.html - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4WMHIM64Q35NGTR6R3ILZUL4MA4ANB5/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4WMHIM64Q35NGTR6R3ILZUL4MA4ANB5/ - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4137-1/ - (UBUNTU) https://usn.ubuntu.com/4137-1/ - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Nov/25 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Nov/25 - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWNVTFA2CKXERXRYPYE2YFTZP4GNBGYY/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWNVTFA2CKXERXRYPYE2YFTZP4GNBGYY/ - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00077.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00077.html - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFWQBNFTAVHPUYNGYO2TCPF5PCSWC2Z7/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFWQBNFTAVHPUYNGYO2TCPF5PCSWC2Z7/ - Mailing List, Third Party Advisory
CWE CWE-754 CWE-674

Information

Published : 2019-09-19 14:15

Updated : 2024-02-04 20:20


NVD link : CVE-2019-11779

Mitre link : CVE-2019-11779

CVE.ORG link : CVE-2019-11779


JSON object : View

Products Affected

opensuse

  • backports_sle
  • leap

canonical

  • ubuntu_linux

eclipse

  • mosquitto

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-674

Uncontrolled Recursion

CWE-754

Improper Check for Unusual or Exceptional Conditions