漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
CocoaMQTT: Denial of Service via Reachable Assertion in `PUBLISH` Packet Parsing
Vulnerability Description
CocoaMQTT is a MQTT 5.0 client library for iOS and macOS written in Swift. Prior to version 2.2.2, a vulnerability exists in the packet parsing logic of CocoaMQTT that allows an attacker (or a compromised/malicious MQTT broker) to remotely crash the host iOS/macOS/tvOS application. If an attacker publishes the 4-byte malformed payload to a shared topic with the RETAIN flag set to true, the MQTT broker will persist the payload. Any time a vulnerable client connects and subscribes to that topic, the broker will automatically push the malformed packet. The app will instantly crash in the background before the user can even interact with it. This effectively "bricks" the mobile application (a persistent DoS) until the retained message is manually wiped from the broker database. This issue has been patched in version 2.2.2.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Vulnerability Type
可达断言
Vulnerability Title
CocoaMQTT 安全漏洞
Vulnerability Description
CocoaMQTT是EMQ Technologies开源的一个MQTT客户端库。 CocoaMQTT 2.2.2之前版本存在安全漏洞,该漏洞源于数据包解析逻辑存在问题,允许攻击者或恶意MQTT代理远程崩溃主机iOS、macOS或tvOS应用程序,可能导致持久性拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A