First published: Fri Oct 11 2024(Updated: )
In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fault or heap-use-after-free by sending specific sequences of "CONNECT", "DISCONNECT", "SUBSCRIBE", "UNSUBSCRIBE" and "PUBLISH" packets.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO Messaging - Eclipse Mosquitto Distribution - Core | <2.0.19 |
https://github.com/eclipse-mosquitto/mosquitto/commit/1914b3ee2a18102d0a94cbdbbfeae1afa03edd17
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8376 is categorized as a high severity vulnerability due to its potential to cause memory leaks and segmentation faults.
Eclipse Mosquitto versions up to and including 2.0.18a are affected by CVE-2024-8376.
To mitigate CVE-2024-8376, upgrade to Eclipse Mosquitto version 2.0.19 or later.
CVE-2024-8376 allows attackers to perform memory leaking, segmentation faults, or heap-use-after-free attacks through specific MQTT packet sequences.
Currently, there are no documented workarounds for CVE-2024-8376, and upgrading is recommended.