First published: Sun Oct 28 2018(Updated: )
An exploitable arbitrary memory read vulnerability exists in the MQTT packet-parsing functionality of Cesanta Mongoose 6.13. It is a heap-based buffer over-read in mg_mqtt_next_subscribe_topic. A specially crafted MQTT SUBSCRIBE packet can cause an arbitrary out-of-bounds memory read potentially resulting in information disclosure and denial of service. An attacker needs to send a specially crafted MQTT packet over the network to trigger this vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cesanta Mongoose | =6.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18765 is an exploitable arbitrary memory read vulnerability that exists in the MQTT packet-parsing functionality of Cesanta Mongoose 6.13.
CVE-2018-18765 has a severity rating of 9.1, which is considered critical.
Cesanta Mongoose version 6.13 is affected by CVE-2018-18765.
CVE-2018-18765 can be exploited by sending a specially crafted MQTT SUBSCRIBE packet.
At the time of writing, there is no known fix for CVE-2018-18765. It is recommended to update to a patched version when available.