First published: Fri Dec 31 2021(Updated: )
wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttDecode_Disconnect (called from MqttClient_DecodePacket and MqttClient_WaitType).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wolfSSL wolfMQTT | =1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45936 is a heap-based buffer overflow vulnerability in wolfSSL wolfMQTT 1.9.
CVE-2021-45936 is classified as a medium severity vulnerability with a severity score of 5.5.
Versions 1.9 of wolfSSL wolfMQTT are affected by CVE-2021-45936.
To fix CVE-2021-45936, users should update to a version of wolfSSL wolfMQTT that is not affected by the vulnerability.
You can find more information about CVE-2021-45936 at the following references: [1](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39053), [2](https://github.com/google/oss-fuzz-vulns/blob/main/vulns/wolfmqtt/OSV-2021-1348.yaml), [3](https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2).