First published: Sun Oct 28 2018(Updated: )
An exploitable arbitrary memory read vulnerability exists in the MQTT packet-parsing functionality of Cesanta Mongoose 6.13. It is a heap-based buffer over-read in a parse_mqtt getu16 call. A specially crafted MQTT SUBSCRIBE packet can cause an arbitrary out-of-bounds memory read potentially resulting in information disclosure and denial of service. An attacker needs to send a specially crafted MQTT packet over the network to trigger this vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cesanta Mongoose | =6.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18764 is an arbitrary memory read vulnerability in the MQTT packet-parsing functionality of Cesanta Mongoose 6.13.
CVE-2018-18764 has a severity rating of 9.1 (Critical).
Cesanta Mongoose version 6.13 is affected by CVE-2018-18764.
CVE-2018-18764 can be exploited by sending a specially crafted MQTT SUBSCRIBE packet.
Yes, you can find references for CVE-2018-18764 at the following links: [Link1](https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20getu16%20heap%20buffer%20overflow1.md), [Link2](https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20getu16%20heap%20buffer%20overflow2.md).