RTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-24879 RTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.
Fixes

Solution

RTI recommends users apply the available patches for these issues. A patch is available on the RTI customer portal or by contacting RTI Support. Also, contact RTI Support for mitigations, including how to use RTI DDS Secure to mitigate against the network amplification issue.


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 05 Feb 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Rti connext Professional
Rti connext Secure
CPEs cpe:2.3:a:rti:connext_dds_professional:*:*:*:*:*:*:*:*
cpe:2.3:a:rti:connext_dds_secure:*:*:*:*:*:*:*:*
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
cpe:2.3:a:rti:connext_secure:*:*:*:*:*:*:*:*
Vendors & Products Rti connext Dds Professional
Rti connext Dds Secure
Rti connext Professional
Rti connext Secure

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:23:03.124Z

Reserved: 2021-08-10T00:00:00.000Z

Link: CVE-2021-38427

cve-icon Vulnrichment

Updated: 2024-08-04T01:44:22.264Z

cve-icon NVD

Status : Modified

Published: 2022-05-05T17:15:09.147

Modified: 2025-02-05T13:26:20.443

Link: CVE-2021-38427

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.