Vulnerability Description
A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function copyn_str() in the file mqtt_parser.c. An attacker could exploit this vulnerability to cause a denial of service attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emqx | Nanomq | 0.17.2 |
Related Weaknesses (CWE)
References
- https://github.com/emqx/nanomqProduct
- https://github.com/emqx/nanomq/issues/1155Exploit
- https://github.com/nanomq/NanoNNG/pull/509/commits/6815c4036a2344865da393803ecdbPatch
- https://github.com/emqx/nanomqProduct
- https://github.com/emqx/nanomq/issues/1155Exploit
- https://github.com/nanomq/NanoNNG/pull/509/commits/6815c4036a2344865da393803ecdbPatch
FAQ
What is CVE-2023-33660?
CVE-2023-33660 is a vulnerability with a CVSS score of 7.5 (HIGH). A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function copyn_str() in the file mqtt_parser.c. An attacker could exploit this vulnerabi...
How severe is CVE-2023-33660?
CVE-2023-33660 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33660?
Check the references section above for vendor advisories and patch information. Affected products include: Emqx Nanomq.