A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding.
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://hackerone.com/reports/541354 | patch exploit third party advisory issue tracking |