Heap-Based Buffer Overflow in wolfMQTT from wolfSSL
CVE-2021-45933
5.5MEDIUM
Summary
wolfMQTT version 1.9 contains a critical vulnerability that allows a heap-based buffer overflow in the MqttDecode_Publish function. This issue can be triggered during the decoding of publish packets, leading to potential memory corruption and arbitrary code execution. The vulnerability originates from improper validation of input sizes, specifically an overflow of 8 bytes, impacting the overall integrity of the MQTT protocol implementation. Users of affected versions are advised to update to mitigate risks associated with this security flaw.
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved