First published: Thu May 05 2022(Updated: )
RTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
RTI Connext DDS Professional | >=4.2.0<=6.1.0 | |
Rti Connext Dds Secure | >=4.2.0<=6.1.0 | |
<0.8.0 | 0.8.0 | |
<2.4.0 | 2.4.0 | |
<3.18.1 | 3.18.1 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Real-Time Innovations (RTI) Connext DDS Professional and Connext DDS Secure: Versions 4.2x to 6.1.0 | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing RTI Connext DDS Micro | >=3.0.0 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing TwinOaks Computing CoreDX DDS | <5.9.1 | 5.9.1 |
RTI recommends users apply the available patches for these issues. A patch is available on the RTI customer portal or by contacting RTI Support. Also, contact RTI Support for mitigations, including how to use RTI DDS Secure to mitigate against the network amplification issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-38427.
The severity of CVE-2021-38427 is high with a CVSS score of 7.8.
Versions 4.2.x to 6.1.0 of RTI Connext DDS Professional are affected.
Versions 4.2.x to 6.1.0 of RTI Connext DDS Secure are affected.
A local attacker can exploit this vulnerability to execute arbitrary code.