In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fault or heap-use-after-free by sending specific sequences of "CONNECT", "DISCONNECT", "SUBSCRIBE", "UNSUBSCRIBE" and "PUBLISH" packets.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/216 | issue tracking |
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/217 | issue tracking |
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/218 | issue tracking |
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/227 | issue tracking |
https://gitlab.eclipse.org/security/cve-assignement/-/issues/26 | vendor advisory issue tracking |
https://github.com/eclipse/mosquitto/releases/tag/v2.0.19 | product patch |
https://mosquitto.org/ | product |
https://github.com/eclipse-mosquitto/mosquitto/commit/1914b3ee2a18102d0a94cbdbbfeae1afa03edd17 | patch |