{"id":"CVE-2023-39945","summary":"Malformed serialized data in a data submessage leads to unhandled exception","details":"eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.11.0, 2.10.2, 2.9.2, and 2.6.5, a data submessage sent to PDP port raises unhandled `BadParamException` in fastcdr, which in turn crashes fastdds. Versions 2.11.0, 2.10.2, 2.9.2, and 2.6.5 contain a patch for this issue.","aliases":["GHSA-2rq6-8j7x-frr9"],"modified":"2026-04-28T04:08:04.743112Z","published":"2023-08-11T13:21:53.298Z","database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-248"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/39xxx/CVE-2023-39945.json"},"references":[{"type":"WEB","url":"https://bombshell.gtisc.gatech.edu/ddsfuzz/pcap/fastdds-exception-20230509-02.pcap"},{"type":"WEB","url":"https://github.com/eProsima/Fast-CDR/blob/v1.0.26/src/cpp/Cdr.cpp#L72-L79"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/39xxx/CVE-2023-39945.json"},{"type":"ADVISORY","url":"https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-2rq6-8j7x-frr9"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39945"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5481"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/eprosima/fast-dds","events":[{"introduced":"7124ff87c4813bed26858fd89d3b915a5857dbc7"},{"fixed":"8f2a8828dcffab1e78f14023cdae7a8efe4e4a5b"},{"introduced":"4c55488d6225283b2e2114438a1bd726411876e7"},{"fixed":"9ebff95553a25855974d85e909fdebf046a8dc2c"},{"introduced":"463d59ca81c7fd732edf45b982a58c0b54fc1da4"},{"fixed":"2be7879185bfa2b67d5a9777ddee0a7e637776f3"}],"database_specific":{"cpe":"cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"2.6.0"},{"fixed":"2.6.5"},{"introduced":"2.9.0"},{"fixed":"2.9.2"},{"introduced":"2.10.0"},{"fixed":"2.10.2"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-39945.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"}]}