First published: Fri Dec 31 2021(Updated: )
wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Subscribe).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wolfSSL wolfMQTT | =1.9 | |
=1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-45939.
The severity of CVE-2021-45939 is medium with a CVSS score of 5.5.
The affected software is wolfSSL wolfMQTT 1.9.
The CWE ID for this vulnerability is CWE-119 and CWE-787.
Yes, you can find the references for this vulnerability at the following links: [link1](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39103), [link2](https://github.com/google/oss-fuzz-vulns/blob/main/vulns/wolfmqtt/OSV-2021-1361.yaml), [link3](https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2).