First published: Mon May 13 2024(Updated: )
FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves malformed `RTPS` packet, heap buffer overflow occurs on the subscriber. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
eProsima Fast DDS | <2.6.8<2.10.4<2.13.5<2.14.1 | |
eProsima Fast DDS | <2.6.8 | |
eProsima Fast DDS | >=2.10.0<2.10.4 | |
eProsima Fast DDS | >=2.13.0<2.13.5 | |
eProsima Fast DDS | =2.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30259 has a high severity rating due to the potential for remote code execution through heap buffer overflow.
To fix CVE-2024-30259, upgrade FastDDS to version 2.14.1, 2.13.5, 2.10.4, or 2.6.8 or later.
CVE-2024-30259 affects all versions of eProsima FastDDS prior to 2.14.1, 2.13.5, 2.10.4, and 2.6.8.
CVE-2024-30259 is caused by a heap buffer overflow triggered by malformed RTPS packets from a publisher.
Yes, CVE-2024-30259 can be exploited remotely, allowing attackers to execute arbitrary code on the subscriber's system.