Vulnerability Description
Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH parsed message with a variable length header, Cesanta Mongoose, an embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cesanta | Mongoose | 7.10 |
Related Weaknesses (CWE)
References
- https://github.com/cesanta/mongoose/pull/2274Patch
- https://github.com/cesanta/mongoose/releases/tag/7.11Release Notes
- https://takeonme.org/cves/CVE-2023-2905.htmlExploitPatchThird Party Advisory
- https://github.com/cesanta/mongoose/pull/2274Patch
- https://github.com/cesanta/mongoose/releases/tag/7.11Release Notes
- https://takeonme.org/cves/CVE-2023-2905.htmlExploitPatchThird Party Advisory
FAQ
What is CVE-2023-2905?
CVE-2023-2905 is a vulnerability with a CVSS score of 8.8 (HIGH). Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH parsed message with a variable length header, Cesanta Mongoose, an embeddable web server, version 7.10 is susceptible to a heap...
How severe is CVE-2023-2905?
CVE-2023-2905 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2905?
Check the references section above for vendor advisories and patch information. Affected products include: Cesanta Mongoose.