Vulnerabilities > CVE-2023-28366 - Memory Leak vulnerability in Eclipse Mosquitto
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
The broker in Eclipse Mosquitto 1.3.2 through 2.x before 2.0.16 has a memory leak that can be abused remotely when a client sends many QoS 2 messages with duplicate message IDs, and fails to respond to PUBREC commands. This occurs because of mishandling of EAGAIN from the libc send function.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/eclipse/mosquitto/commit/6113eac95a9df634fbc858be542c4a0456bfe7b9
- https://github.com/eclipse/mosquitto/compare/v2.0.15...v2.0.16
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJ2FMBGVVQEQWTTQB7YLKTAHMX2UM66X/
- https://mosquitto.org/blog/2023/08/version-2-0-16-released/
- https://security.gentoo.org/glsa/202401-09
- https://www.compass-security.com/fileadmin/Research/Advisories/2023_02_CSNC-2023-001_Eclipse_Mosquitto_Memory_Leak.txt
- https://www.debian.org/security/2023/dsa-5511
- https://github.com/eclipse/mosquitto/commit/6113eac95a9df634fbc858be542c4a0456bfe7b9
- https://www.debian.org/security/2023/dsa-5511
- https://www.compass-security.com/fileadmin/Research/Advisories/2023_02_CSNC-2023-001_Eclipse_Mosquitto_Memory_Leak.txt
- https://security.gentoo.org/glsa/202401-09
- https://mosquitto.org/blog/2023/08/version-2-0-16-released/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJ2FMBGVVQEQWTTQB7YLKTAHMX2UM66X/
- https://github.com/eclipse/mosquitto/compare/v2.0.15...v2.0.16