Vulnerability Description
A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_msg_get_pub_pid() in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emqx | Nanomq | 0.17.2 |
Related Weaknesses (CWE)
References
- https://github.com/emqx/nanomqProduct
- https://github.com/emqx/nanomq/issues/1153Exploit
- https://github.com/nanomq/NanoNNG/commit/657e6c81c474bdee0e6413483b990e90610030cPatch
- https://github.com/emqx/nanomqProduct
- https://github.com/emqx/nanomq/issues/1153Exploit
- https://github.com/nanomq/NanoNNG/commit/657e6c81c474bdee0e6413483b990e90610030cPatch
FAQ
What is CVE-2023-33658?
CVE-2023-33658 is a vulnerability with a CVSS score of 7.5 (HIGH). A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_msg_get_pub_pid() in the file message.c. An attacker could exploit this vul...
How severe is CVE-2023-33658?
CVE-2023-33658 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33658?
Check the references section above for vendor advisories and patch information. Affected products include: Emqx Nanomq.