Home

Description

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un authenticated sender can transmit a single malformed RTPS DATA_FRAG packet where `fragmentSize` and `sampleSize` are craft ed to violate internal assumptions. Due to a 4-byte alignment step during fragment metadata initialization, the code write s past the end of the allocated payload buffer, causing immediate crash (DoS) and potentially enabling memory corruption ( RCE risk). Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.

PUBLISHED Reserved 2025-10-22 | Published 2026-02-03 | Updated 2026-02-03 | Assigner GitHub_M




HIGH: 7.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-122 Heap-based Buffer Overflow

Product status

Default status
unaffected

3.4.0 (custom) before 3.4.1
affected

3.0.0 (custom) before 3.3.1
affected

Any version before 2.6.11
affected

References

security-tracker.debian.org/tracker/CVE-2025-62799

github.com/...ommit/d6dd58f4ecd28cd1c3bc4ef0467be9110fa94659

github.com/...ommit/0c3824ef4991628de5dfba240669dc6172d63b46

github.com/...ommit/955c8a15899dc6eb409e080fe7dc89e142d5a514

cve.org (CVE-2025-62799)

nvd.nist.gov (CVE-2025-62799)

Download JSON