First published: Fri Dec 31 2021(Updated: )
wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (4 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacket).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wolfSSL wolfMQTT | =1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45932 is a vulnerability in wolfSSL wolfMQTT 1.9 that allows a heap-based buffer overflow, resulting in potential code execution or denial of service.
CVE-2021-45932 has a severity score of 5.5, which is considered medium.
The affected software version of CVE-2021-45932 is wolfSSL wolfMQTT 1.9.
CVE-2021-45932 can be exploited by sending a specially crafted MQTT packet that triggers the heap-based buffer overflow.
Yes, a fix for CVE-2021-45932 is available in the latest version of wolfSSL wolfMQTT. It is recommended to update to the latest version to mitigate the vulnerability.