CVE ID | CVE-2018-17614 |
CVSS SCORE | 5.4, AV:A/AC:M/Au:N/C:P/I:P/A:P |
AFFECTED VENDORS |
Losant |
AFFECTED PRODUCTS |
Arduino MQTT Client |
VULNERABILITY DETAILS |
The specific flaw exists within the parsing of MQTT PUBLISH packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. |
ADDITIONAL DETAILS |
Losant has issued an update to correct this vulnerability. More details can be found at:
https://github.com/knolleary/pubsubclient/releases/tag/v2.7 |
DISCLOSURE TIMELINE |
|
CREDIT | Federico "phretor" Maggi of Trend Micro Security Research and Davide "_ocean" Quarta |