First published: Fri Dec 31 2021(Updated: )
wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_HandlePacket and MqttClient_WaitType).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wolfSSL wolfMQTT | =1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-45934 is medium, with a severity value of 5.5.
The affected software of CVE-2021-45934 is wolfSSL wolfMQTT version 1.9.
To fix the heap-based buffer overflow in CVE-2021-45934, update to a version of wolfSSL wolfMQTT that is not affected by the vulnerability.
Yes, there are several references for CVE-2021-45934. You can find them at the following links: [link1], [link2], [link3].
The Common Weakness Enumeration (CWE) IDs associated with CVE-2021-45934 are CWE-119 and CWE-787.