First published: Thu May 05 2022(Updated: )
All versions of GurumDDS improperly calculate the size to be used when allocating the buffer, which may result in a buffer overflow.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Gurum Gurumdds | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Eclipse CycloneDDS | <0.8.0 | 0.8.0 |
eProsima Fast DDS | <2.4.0 | 2.4.0 |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing GurumNetworks GurumDDS | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Object Computing, Inc. (OCI) OpenDDS | <3.18.1 | 3.18.1 |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Real-Time Innovations (RTI) Connext DDS Professional and Connext DDS Secure: Versions 4.2x to 6.1.0 | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing RTI Connext DDS Micro | >=3.0.0 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing TwinOaks Computing CoreDX DDS | <5.9.1 | 5.9.1 |
Users should contact GurumNetworks for assistance. contact@gurum.cc
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38423 has been rated as a critical vulnerability due to its potential to cause a buffer overflow.
CVE-2021-38423 affects all versions of GurumDDS and associated products including Eclipse CycloneDDS, eProsima Fast DDS, and OpenDDS.
To fix CVE-2021-38423, update GurumDDS and related products to the latest patched versions indicated by the vendor.
The risks associated with CVE-2021-38423 include potential arbitrary code execution and denial of service through buffer overflow.
There are currently no known workarounds for CVE-2021-38423, so upgrading to a secure version is recommended.