Impact
An integer overflow in eProsima Fast‑DDS’s readBinaryPropertySeq function occurs when the length field of a property in the DATA Submessage is tampered with while DDS Security is enabled. This overflow leads to an out‑of‑memory condition during a resize operation, causing the Fast‑DDS process to crash. The result is a remote denial of service that can terminate any Fast‑DDS instance receiving the malformed packet, reflecting the weaknesses detailed in CWE‑190 and CWE‑789.
Affected Systems
The flaw affects eProsima Fast‑DDS versions prior to 2.6.11, 2.14.6, 3.2.4, 3.3.1, and 3.4.1. Systems running these libraries on Debian Linux 11, 12, or 13 are impacted when DDS Security is enabled. Any deployment that uses the secure branch of Fast‑DDS must verify the version in use.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity, while the EPSS score of less than 1% suggests a low probability of real‑world exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a publisher able to send a crafted SPDP packet to a target subscriber with security enabled—a scenario plausible in shared or hostile networks such as industrial control or multiplayer gaming environments. The crash is repeatable and reliably triggers a denial‑of‑service once the conditions are met.
OpenCVE Enrichment