First published: Wed Oct 30 2024(Updated: )
In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Mosquitto | >=1.3.2<=2.0.18 | |
Eclipse Mosquitto | >=1.3.2<2.0.19 |
https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10525 is considered a medium severity vulnerability due to the potential for out-of-bounds memory access.
To fix CVE-2024-10525, upgrade Eclipse Mosquitto to version 2.0.19 or later.
CVE-2024-10525 affects Eclipse Mosquitto versions from 1.3.2 through 2.0.18.
CVE-2024-10525 allows an attacker to exploit a malicious broker's crafted SUBACK packet to cause a client to make out-of-bounds memory access.
Yes, the mosquitto_sub client using libmosquitto is impacted by CVE-2024-10525.