CVE-2023-39947
moderate-risk
Published 2023-08-11
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6, even after the fix at commit 3492270, malformed `PID_PROPERTY_LIST` parameters cause heap overflow at a different program counter. This can remotely crash any Fast-DDS process. Versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6 contain a patch for this issue.
Do I need to act?
-
0.10% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.2/10
High
NETWORK
/ LOW complexity
Affected Products (4)
References (6)
Third Party Advisory
https://github.com/eProsima/Fast-DDS/commit/349227005827e8a67a0406b823138b5068cc...
Third Party Advisory
https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-mf55-5747-c4pv
Third Party Advisory
https://www.debian.org/security/2023/dsa-5481
Third Party Advisory
https://github.com/eProsima/Fast-DDS/commit/349227005827e8a67a0406b823138b5068cc...
Third Party Advisory
https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-mf55-5747-c4pv
Third Party Advisory
https://www.debian.org/security/2023/dsa-5481
38
/ 100
moderate-risk
Severity
28/34 · Critical
Exploitability
0/34 · Minimal
Exposure
10/34 · Low