CVE-2024-30259

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-30259
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-30259.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-30259
Aliases
  • GHSA-qcj9-939p-p662
Downstream
Published
2024-05-13T14:45:28Z
Modified
2025-10-22T18:42:14.063141Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H CVSS Calculator
Summary
FastDDS heap buffer overflow when publisher sends malformed packet
Details

FastDDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group). Prior to versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8, when a publisher serves malformed RTPS packet, heap buffer overflow occurs on the subscriber. This can remotely crash any Fast-DDS process, potentially leading to a DOS attack. Versions 2.14.1, 2.13.5, 2.10.4, and 2.6.8 contain a patch for the issue.

Database specific
{
    "cwe_ids": [
        "CWE-120",
        "CWE-122"
    ]
}
References

Affected packages

Git / github.com/eprosima/fast-dds

Affected ranges

Type
GIT
Repo
https://github.com/eprosima/fast-dds
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Type
GIT
Repo
https://github.com/eprosima/fast-dds
Events
Type
GIT
Repo
https://github.com/eprosima/fast-dds
Events
Type
GIT
Repo
https://github.com/eprosima/fast-dds
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.0.0-beta
2.0.0-rc

Other

Discovery-Time_Data_Typing

v0.*

v0.5.2

v1.*

v1.0.0
v1.0.0.a
v1.0.6
v1.1.0
v1.2.0
v1.3.0
v1.3.1
v1.4.0
v1.5.0
v1.6.0
v1.7.0
v1.7.1
v1.7.2
v1.8.0
v1.8.0-2
v1.8.1
v1.9.0
v1.9.0-beta
v1.9.0-beta-2

v2.*

v2.1.0
v2.10.0-rc1
v2.10.1-rc1
v2.14.0
v2.2.0
v2.3.0-1
v2.3.0-api

Database specific

vanir_signatures

[
    {
        "id": "CVE-2024-30259-725a5a7b",
        "target": {
            "file": "src/cpp/rtps/participant/RTPSParticipantImpl.cpp"
        },
        "digest": {
            "line_hashes": [
                "262956306831166481237303932868870361372",
                "306604317174497932475465898607727697833",
                "196513365605387483283372719964676140728",
                "294552922959227129118208678759959282933",
                "233002817893507405036982977419080917531",
                "137118083659526854717517586406070424281"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line",
        "source": "https://github.com/eprosima/fast-dds/commit/3118cba80c7b0db2c9bd0ede8671e3d31785cbda"
    },
    {
        "id": "CVE-2024-30259-ecb73c2a",
        "target": {
            "function": "RTPSParticipantImpl::update_attributes",
            "file": "src/cpp/rtps/participant/RTPSParticipantImpl.cpp"
        },
        "digest": {
            "length": 6264.0,
            "function_hash": "324427933685653720667523570866654147901"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function",
        "source": "https://github.com/eprosima/fast-dds/commit/3118cba80c7b0db2c9bd0ede8671e3d31785cbda"
    }
]