CVE-2024-10525

In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.
Configurations

No configuration.

History

31 Oct 2024, 10:15

Type Values Removed Values Added
References
  • () https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c -

30 Oct 2024, 14:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
Summary
  • (es) En Eclipse Mosquitto, desde la versión 1.3.2 hasta la 2.0.18, si un agente malintencionado envía un paquete SUBACK manipulado sin códigos de motivo, un cliente que utilice libmosquitto puede realizar un acceso a la memoria fuera de los límites cuando actúe en su devolución de llamada on_subscribe. Esto afecta a los clientes mosquitto_sub y mosquitto_rr.

30 Oct 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-30 12:15

Updated : 2024-11-01 12:57


NVD link : CVE-2024-10525

Mitre link : CVE-2024-10525

CVE.ORG link : CVE-2024-10525


JSON object : View

Products Affected

No product.

CWE
CWE-122

Heap-based Buffer Overflow