CVE-2021-33176

VerneMQ MQTT Broker versions prior to 1.12.0 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:octavolabs:vernemq:*:*:*:*:*:*:*:*

History

21 Jun 2021, 13:43

Type Values Removed Values Added
CWE CWE-770
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:octavolabs:vernemq:*:*:*:*:*:*:*:*
References (MISC) https://www.synopsys.com/blogs/software-security/cyrc-advisory-rabbitmq-emqx-vernemq - (MISC) https://www.synopsys.com/blogs/software-security/cyrc-advisory-rabbitmq-emqx-vernemq - Third Party Advisory

08 Jun 2021, 15:17

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-08 15:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-33176

Mitre link : CVE-2021-33176

CVE.ORG link : CVE-2021-33176


JSON object : View

Products Affected

octavolabs

  • vernemq
CWE
CWE-770

Allocation of Resources Without Limits or Throttling

CWE-502

Deserialization of Untrusted Data