CVE-2021-33175

EMQ X Broker versions prior to 4.2.8 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:emqx:emq_x_broker:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () https://www.synopsys.com/blogs/software-security/cyrc-advisory-rabbitmq-emqx-vernemq - Patch, Third Party Advisory () https://www.synopsys.com/blogs/software-security/cyrc-advisory-rabbitmq-emqx-vernemq - Patch, Third Party Advisory

16 Jun 2021, 14:08

Type Values Removed Values Added
References (MISC) https://www.synopsys.com/blogs/software-security/cyrc-advisory-rabbitmq-emqx-vernemq - (MISC) https://www.synopsys.com/blogs/software-security/cyrc-advisory-rabbitmq-emqx-vernemq - Patch, Third Party Advisory
CPE cpe:2.3:a:emqx:emq_x_broker:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-770

08 Jun 2021, 15:17

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-08 15:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-33175

Mitre link : CVE-2021-33175

CVE.ORG link : CVE-2021-33175


JSON object : View

Products Affected

emqx

  • emq_x_broker
CWE
CWE-502

Deserialization of Untrusted Data

CWE-770

Allocation of Resources Without Limits or Throttling