In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fault or heap-use-after-free by sending specific sequences of "CONNECT", "DISCONNECT", "SUBSCRIBE", "UNSUBSCRIBE" and "PUBLISH" packets.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.0.21-1", "binary_name": "libmosquitto-dev" }, { "binary_version": "2.0.21-1", "binary_name": "libmosquitto1" }, { "binary_version": "2.0.21-1", "binary_name": "libmosquitto1-dbgsym" }, { "binary_version": "2.0.21-1", "binary_name": "libmosquittopp-dev" }, { "binary_version": "2.0.21-1", "binary_name": "libmosquittopp1" }, { "binary_version": "2.0.21-1", "binary_name": "libmosquittopp1-dbgsym" }, { "binary_version": "2.0.21-1", "binary_name": "mosquitto" }, { "binary_version": "2.0.21-1", "binary_name": "mosquitto-clients" }, { "binary_version": "2.0.21-1", "binary_name": "mosquitto-clients-dbgsym" }, { "binary_version": "2.0.21-1", "binary_name": "mosquitto-dbgsym" }, { "binary_version": "2.0.21-1", "binary_name": "mosquitto-dev" } ] }