Vulnerability Details : CVE-2023-39947
eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6, even after the fix at commit 3492270, malformed `PID_PROPERTY_LIST` parameters cause heap overflow at a different program counter. This can remotely crash any Fast-DDS process. Versions 2.11.1, 2.10.2, 2.9.2, and 2.6.6 contain a patch for this issue.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2023-39947
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
- cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
- cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
- cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
- cpe:2.3:a:eprosima:fast_dds:2.11.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-39947
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39947
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
8.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H |
3.9
|
4.2
|
GitHub, Inc. |
CWE ids for CVE-2023-39947
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: security-advisories@github.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-39947
-
https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-mf55-5747-c4pv
Another heap overflow in push_back_helper · Advisory · eProsima/Fast-DDS · GitHubThird Party Advisory
-
https://www.debian.org/security/2023/dsa-5481
Debian -- Security Information -- DSA-5481-1 fastddsThird Party Advisory
-
https://github.com/eProsima/Fast-DDS/commit/349227005827e8a67a0406b823138b5068cc47dc
Validate lengths before using them. · eProsima/Fast-DDS@3492270 · GitHubThird Party Advisory
Jump to