Miggo Logo

CVE-2016-10523: Denial of Service in mqtt-packet

5

CVSS Score

Basic Information

EPSS Score
0.58509%
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
mqtt-packetnpm< 3.4.63.4.6
mqtt-packetnpm>= 4.0.0, < 4.0.54.0.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in packet parsing logic where invalid inputs trigger unhandled exceptions or buffer overreads. Key vulnerable functions identified through patch analysis:

  1. parse() - Top-level parsing loop lacked error handling
  2. _parseConnect() - Missing protocol validation checks
  3. _parseString() - Insufficient buffer bounds checking
  4. _parseConnack() - Missing buffer length validation
  5. _parseNum() - Incorrect buffer space check These functions directly process packet fields and were modified in security patches to add validation checks. During exploitation, malicious packets would flow through these parsing functions before triggering crashes, making them visible in runtime profiles.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsions o* `mqtt-p**k*t` prior to *.*.*, or *.x prior to *.*.* *r* *****t** *y * **ni*l o* s*rvi** vuln*r**ility w**r*in sp**i*i* s*qu*n**s o* MQTT p**k*ts **n *r*s* t** *ppli**tion. ## R**omm*n**tion V*rsion *.x: Up**t* to v*rsion *.*.* or l*t

Reasoning

T** vuln*r**ility m*ni**sts in p**k*t p*rsin* lo*i* w**r* inv*li* inputs tri***r un**n*l** *x**ptions or *u***r ov*rr***s. K*y vuln*r**l* *un*tions i**nti*i** t*rou** p*t** *n*lysis: *. p*rs*() - Top-l*v*l p*rsin* loop l**k** *rror **n*lin* *. _p*rs*