CVE-2023-39946
moderate-risk
Published 2023-08-11
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6, heap can be overflowed by providing a PID_PROPERTY_LIST parameter that contains a CDR string with length larger than the size of actual content. In `eprosima::fastdds::dds::ParameterPropertyList_t::push_back_helper`, `memcpy` is called to first copy the octet'ized length and then to copy the data into `properties_.data`. At the second memcpy, both `data` and `size` can be controlled by anyone that sends the CDR string to the discovery multicast port. This can remotely crash any Fast-DDS process. Versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6 contain a patch for this issue.
Do I need to act?
-
0.11% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.2/10
High
NETWORK
/ LOW complexity
Affected Products (4)
References (6)
Third Party Advisory
https://github.com/eProsima/Fast-DDS/commit/349227005827e8a67a0406b823138b5068cc...
Third Party Advisory
https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-j297-rg6j-m7hx
Third Party Advisory
https://www.debian.org/security/2023/dsa-5481
Third Party Advisory
https://github.com/eProsima/Fast-DDS/commit/349227005827e8a67a0406b823138b5068cc...
Third Party Advisory
https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-j297-rg6j-m7hx
Third Party Advisory
https://www.debian.org/security/2023/dsa-5481
38
/ 100
moderate-risk
Severity
28/34 · Critical
Exploitability
0/34 · Minimal
Exposure
10/34 · Low