CVE-2024-30259

FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves malformed `RTPS` packet, heap buffer overflow occurs on the subscriber. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:2.14.0:*:*:*:*:*:*:*

History

27 Jan 2025, 18:16

Type Values Removed Values Added
CPE cpe:2.3:a:eprosima:fast_dds:2.14.0:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
First Time Eprosima fast Dds
Eprosima
CWE CWE-787
References () https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing - () https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing - Exploit
References () https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662 - () https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662 - Exploit, Vendor Advisory
References () https://vimeo.com/907641887?share=copy - () https://vimeo.com/907641887?share=copy - Exploit

21 Nov 2024, 09:11

Type Values Removed Values Added
References () https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing - () https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing -
References () https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662 - () https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662 -
References () https://vimeo.com/907641887?share=copy - () https://vimeo.com/907641887?share=copy -
Summary
  • (es) FastDDS es una implementación en C++ del estándar DDS (Servicio de distribución de datos) de OMG (Object Management Group). Antes de las versiones 2.14.1, 2.13.5, 2.10.4 y 2.6.8, cuando un editor entrega un paquete "RTPS" con formato incorrecto, se produce un desbordamiento de búfer de almacenamiento dinámico en el suscriptor. Esto puede bloquear de forma remota cualquier proceso Fast-DDS, lo que podría provocar un ataque de DOS. Las versiones 2.14.1, 2.13.5, 2.10.4 y 2.6.8 contienen un parche para el problema.

14 May 2024, 15:22

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 15:22

Updated : 2025-01-27 18:16


NVD link : CVE-2024-30259

Mitre link : CVE-2024-30259

CVE.ORG link : CVE-2024-30259


JSON object : View

Products Affected

eprosima

  • fast_dds
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write