First published: Thu May 05 2022(Updated: )
All versions of GurumDDS are vulnerable to heap-based buffer overflow, which may cause a denial-of-service condition or remotely execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Gurum Gurumdds | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Eclipse CycloneDDS | <0.8.0 | 0.8.0 |
eProsima Fast DDS | <2.4.0 | 2.4.0 |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing GurumNetworks GurumDDS | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Object Computing, Inc. (OCI) OpenDDS | <3.18.1 | 3.18.1 |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing Real-Time Innovations (RTI) Connext DDS Professional and Connext DDS Secure: Versions 4.2x to 6.1.0 | ||
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing RTI Connext DDS Micro | >=3.0.0 | |
Eclipse, eProsima, GurumNetworks, Object Computing, Inc. (OCI), Real-Time Innovations (RTI), TwinOaks Computing TwinOaks Computing CoreDX DDS | <5.9.1 | 5.9.1 |
Users should contact GurumNetworks for assistance. contact@gurum.cc
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38439 is considered a high-severity vulnerability due to its potential to cause denial-of-service conditions or allow remote code execution.
To address CVE-2021-38439, upgrade vulnerable products to the recommended versions listed by the vendors.
CVE-2021-38439 affects multiple products including GurumDDS, Eclipse CycloneDDS, eProsima Fast DDS, and several versions of RTI Connext DDS.
The impact of CVE-2021-38439 includes a possible denial-of-service attack or remote execution of arbitrary code resulting from a heap-based buffer overflow.
Versions of affected products that are equal to or later than the specified remedial versions are safe from CVE-2021-38439.