Vulnerability Details : CVE-2019-11779
In Eclipse Mosquitto 1.5.0 to 1.6.5 inclusive, if a malicious MQTT client sends a SUBSCRIBE packet containing a topic that consists of approximately 65400 or more '/' characters, i.e. the topic hierarchy separator, then a stack overflow will occur.
Products affected by CVE-2019-11779
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*
- cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-11779
7.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-11779
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2019-11779
-
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.Assigned by: nvd@nist.gov (Primary)
-
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.Assigned by: emo@eclipse.org (Secondary)
References for CVE-2019-11779
-
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00077.html
[security-announce] openSUSE-SU-2019:2206-1: moderate: Security update fMailing List;Third Party Advisory
-
https://seclists.org/bugtraq/2019/Nov/25
Bugtraq: [SECURITY] [DSA 4570-1] mosquitto security updateMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFWQBNFTAVHPUYNGYO2TCPF5PCSWC2Z7/
[SECURITY] Fedora 31 Update: mosquitto-1.6.7-1.fc31 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://www.debian.org/security/2019/dsa-4570
Debian -- Security Information -- DSA-4570-1 mosquittoThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html
[SECURITY] [DLA 1972-1] mosquitto security updateMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWNVTFA2CKXERXRYPYE2YFTZP4GNBGYY/
[SECURITY] Fedora 30 Update: mosquitto-1.6.7-1.fc30 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4WMHIM64Q35NGTR6R3ILZUL4MA4ANB5/
[SECURITY] Fedora 29 Update: mosquitto-1.6.7-1.fc29 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://bugs.eclipse.org/bugs/show_bug.cgi?id=551160
551160 – (CVE-2019-11779) Mosquitto: CVE request - extremely deep hierarchy causes stack overflowVendor Advisory
-
https://usn.ubuntu.com/4137-1/
USN-4137-1: Mosquitto vulnerability | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00008.html
[security-announce] openSUSE-SU-2019:2247-1: moderate: Security update fMailing List;Third Party Advisory
Jump to