First published: Mon May 13 2024(Updated: )
FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves a malformed `RTPS` packet, the subscriber crashes when creating `pthread`. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
eProsima Fast DDS | <2.6.8<2.10.4<2.13.5<2.14.1 | |
eProsima Fast DDS | <2.6.8 | |
eProsima Fast DDS | >=2.10.0<2.10.4 | |
eProsima Fast DDS | >=2.13.0<2.13.5 | |
eProsima Fast DDS | =2.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30258 has been categorized with a moderate severity due to potential crashes of the subscriber when handling malformed RTPS packets.
To fix CVE-2024-30258, upgrade eProsima FastDDS to version 2.14.1 or any of the other patched versions 2.13.5, 2.10.4, or 2.6.8.
CVE-2024-30258 affects versions of eProsima FastDDS prior to 2.14.1, 2.13.5, 2.10.4, and 2.6.8.
Failure to address CVE-2024-30258 may result in subscriber crashes when processing invalid RTPS packets, leading to potential service disruptions.
Yes, CVE-2024-30258 can be exploited remotely when a publisher sends a malformed RTPS packet to a subscriber.