yashpatelphd / CVE-2023-51199

Buffer Overflow Vulnerability in ROS2 Foxy Fitzroy

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE ID

CVE-2023-51199

Title

Buffer Overflow Vulnerability in ROS2 Foxy Fitzroy

Vulnerability Type

Buffer Overflow

Severity

Critical (Base Score: 9.8)

Vendor

The Open Source Robotics Foundation (OSRF)

Products Affected

ROS2 Foxy Fitzroy (ROS_VERSION=2 and ROS_PYTHON_VERSION=3)

Description

A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Foxy Fitzroy. This critical issue arises from improper handling of arrays or strings within these components, posing a significant threat to system stability and security.

Impact

Code Execution: True; Other: The vulnerability can lead to system crash or instability, data corruption and loss, compromised security and privacy, and operational disruption.

Attack Vector

The vulnerability can be exploited through various methods, including crafted input data, exploiting network interfaces, delivering malicious payloads, and local application exploitation.

Solution

Users should promptly update to the latest patched version of ROS2 Foxy Fitzroy to mitigate this vulnerability. It is important to ensure that all related components, particularly those written in C++, are also updated to secure versions.

Workaround

If immediate updating is not feasible, users should enforce stringent input validation, enhance network interface security, and be vigilant against suspicious local application activities.

CVE Status

Confirmed and published.

Credit

Yash Patel and Dr. Parag Rughani

References

N/A

About

Buffer Overflow Vulnerability in ROS2 Foxy Fitzroy