CVE-2023-39947
11.08.2023, 14:15
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6, even after the fix at commit 3492270, malformed `PID_PROPERTY_LIST` parameters cause heap overflow at a different program counter. This can remotely crash any Fast-DDS process. Versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6 contain a patch for this issue.Enginsight
Vendor | Product | Version |
---|---|---|
eprosima | fast_dds | 2.6.0 ≤ 𝑥 < 2.6.6 |
eprosima | fast_dds | 2.9.0 ≤ 𝑥 < 2.9.2 |
eprosima | fast_dds | 2.10.0 ≤ 𝑥 < 2.10.2 |
eprosima | fast_dds | 2.11.0 |
debian | debian_linux | 11.0 |
debian | debian_linux | 12.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-122 - Heap-based Buffer OverflowA heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.
References