An exploitable arbitrary memory read vulnerability exists in the MQTT packet-parsing functionality of Cesanta Mongoose 6.13. It is a heap-based buffer over-read in a parse_mqtt getu16 call. A specially crafted MQTT SUBSCRIBE packet can cause an arbitrary out-of-bounds memory read potentially resulting in information disclosure and denial of service. An attacker needs to send a specially crafted MQTT packet over the network to trigger this vulnerability.
References
Link | Resource |
---|---|
https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20getu16%20heap%20buffer%20overflow1.md | Exploit Third Party Advisory |
https://github.com/TiffanyBlue/PoCbyMyself/blob/master/mongoose6.13/mqtt/Cesanta%20Mongoose%20MQTT%20getu16%20heap%20buffer%20overflow2.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-10-29 12:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-18764
Mitre link : CVE-2018-18764
CVE.ORG link : CVE-2018-18764
JSON object : View
Products Affected
cesanta
- mongoose
CWE
CWE-125
Out-of-bounds Read