Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
CocoaMQTT: Denial of Service via Reachable Assertion in `PUBLISH` Packet Parsing
Vulnerability Description
CocoaMQTT is a MQTT 5.0 client library for iOS and macOS written in Swift. Prior to version 2.2.2, a vulnerability exists in the packet parsing logic of CocoaMQTT that allows an attacker (or a compromised/malicious MQTT broker) to remotely crash the host iOS/macOS/tvOS application. If an attacker publishes the 4-byte malformed payload to a shared topic with the RETAIN flag set to true, the MQTT broker will persist the payload. Any time a vulnerable client connects and subscribes to that topic, the broker will automatically push the malformed packet. The app will instantly crash in the background before the user can even interact with it. This effectively "bricks" the mobile application (a persistent DoS) until the retained message is manually wiped from the broker database. This issue has been patched in version 2.2.2.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Vulnerability Type
可达断言
Vulnerability Title
CocoaMQTT 安全漏洞
Vulnerability Description
CocoaMQTT是EMQ Technologies开源的一个MQTT客户端库。 CocoaMQTT 2.2.2之前版本存在安全漏洞,该漏洞源于数据包解析逻辑存在问题,允许攻击者或恶意MQTT代理远程崩溃主机iOS、macOS或tvOS应用程序,可能导致持久性拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A