Vulnerability Description
A use-after-free vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_mqtt_msg_get_publish_property() in the file mqtt_msg.c. This vulnerability is caused by improper data tracing, and an attacker could exploit it to cause a denial of service attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emqx | Nanomq | 0.17.2 |
Related Weaknesses (CWE)
References
- https://github.com/emqx/nanomqProduct
- https://github.com/emqx/nanomq/issues/1165#issue-1668648319ExploitIssue Tracking
- https://github.com/emqx/nanomq/pull/1187Patch
- https://github.com/emqx/nanomqProduct
- https://github.com/emqx/nanomq/issues/1165#issue-1668648319ExploitIssue Tracking
- https://github.com/emqx/nanomq/pull/1187Patch
FAQ
What is CVE-2023-33657?
CVE-2023-33657 is a vulnerability with a CVSS score of 7.5 (HIGH). A use-after-free vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_mqtt_msg_get_publish_property() in the file mqtt_msg.c. This vulnerability is cau...
How severe is CVE-2023-33657?
CVE-2023-33657 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33657?
Check the references section above for vendor advisories and patch information. Affected products include: Emqx Nanomq.