CVE-2021-38427

RTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.
References
Link Resource
https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F Permissions Required Vendor Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rti:connext_dds_professional:*:*:*:*:*:*:*:*
cpe:2.3:a:rti:connext_dds_secure:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-05-05 17:15

Updated : 2024-02-28 19:09


NVD link : CVE-2021-38427

Mitre link : CVE-2021-38427

CVE.ORG link : CVE-2021-38427


JSON object : View

Products Affected

rti

  • connext_dds_professional
  • connext_dds_secure
CWE
CWE-787

Out-of-bounds Write

CWE-121

Stack-based Buffer Overflow