Description
Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un authenticated sender can transmit a single malformed RTPS DATA_FRAG packet where `fragmentSize` and `sampleSize` are craft ed to violate internal assumptions. Due to a 4-byte alignment step during fragment metadata initialization, the code write s past the end of the allocated payload buffer, causing immediate crash (DoS) and potentially enabling memory corruption ( RCE risk). Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
Problem types
CWE-122 Heap-based Buffer Overflow
Product status
3.4.0 (custom) before 3.4.1
3.0.0 (custom) before 3.3.1
Any version before 2.6.11
References
security-tracker.debian.org/tracker/CVE-2025-62799
github.com/...ommit/d6dd58f4ecd28cd1c3bc4ef0467be9110fa94659
github.com/...ommit/0c3824ef4991628de5dfba240669dc6172d63b46
github.com/...ommit/955c8a15899dc6eb409e080fe7dc89e142d5a514