First published: Mon Oct 16 2023(Updated: )
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). In affected versions specific DATA submessages can be sent to a discovery locator which may trigger a free error. This can remotely crash any Fast-DDS process. The call to free() could potentially leave the pointer in the attackers control which could lead to a double free. This issue has been addressed in versions 2.12.0, 2.11.3, 2.10.3, and 2.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
eprosima Fast DDS | <2.6.7 | |
eprosima Fast DDS | >=2.10.0<2.10.3 | |
eprosima Fast DDS | >=2.11.0<=2.11.1 | |
debian/fastdds | <=2.11.2+ds-5<=2.9.1+ds-1+deb12u1 | 2.11.2+ds-6 2.9.1+ds-1+deb12u2 |
debian/fastdds | 2.1.0+ds-9+deb11u1 2.9.1+ds-1+deb12u2 2.11.2+ds-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42459 is a vulnerability in the eprosima Fast DDS library that allows an attacker to remotely crash any Fast-DDS process by sending specific data submessages.
CVE-2023-42459 has a severity rating of 8.6 (high).
Versions up to 2.6.7, versions between 2.10.0 and 2.10.3 (inclusive exclusive), and versions 2.11.0 and 2.11.1 (inclusive inclusive) of eprosima Fast DDS are affected by CVE-2023-42459.
An attacker can exploit CVE-2023-42459 by sending specific DATA submessages to a discovery locator, which triggers a free error and remotely crashes the Fast-DDS process.
Yes, you can find references for CVE-2023-42459 at the following links: [Link 1](https://github.com/eProsima/Fast-DDS/issues/3207), [Link 2](https://github.com/eProsima/Fast-DDS/pull/3824), [Link 3](https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm).