CVE-2025-62799

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un authenticated sender can transmit a single malformed RTPS DATA_FRAG packet where `fragmentSize` and `sampleSize` are craft ed to violate internal assumptions. Due to a 4-byte alignment step during fragment metadata initialization, the code write s past the end of the allocated payload buffer, causing immediate crash (DoS) and potentially enabling memory corruption ( RCE risk). Versions 3.4.1, 3.3.1, and 2.6.11 patch the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:3.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*

History

18 Feb 2026, 16:11

Type Values Removed Values Added
CPE cpe:2.3:a:eprosima:fast_dds:3.4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-787
First Time Debian debian Linux
Eprosima
Debian
Eprosima fast Dds
References () https://github.com/eProsima/Fast-DDS/commit/0c3824ef4991628de5dfba240669dc6172d63b46 - () https://github.com/eProsima/Fast-DDS/commit/0c3824ef4991628de5dfba240669dc6172d63b46 - Patch
References () https://github.com/eProsima/Fast-DDS/commit/955c8a15899dc6eb409e080fe7dc89e142d5a514 - () https://github.com/eProsima/Fast-DDS/commit/955c8a15899dc6eb409e080fe7dc89e142d5a514 - Patch
References () https://github.com/eProsima/Fast-DDS/commit/d6dd58f4ecd28cd1c3bc4ef0467be9110fa94659 - () https://github.com/eProsima/Fast-DDS/commit/d6dd58f4ecd28cd1c3bc4ef0467be9110fa94659 - Patch
References () https://security-tracker.debian.org/tracker/CVE-2025-62799 - () https://security-tracker.debian.org/tracker/CVE-2025-62799 - Third Party Advisory
Summary
  • (es) Fast DDS es una implementación en C++ del estándar DDS (Data Distribution Service) de la OMG (Object Management Group). Antes de las versiones 3.4.1, 3.3.1 y 2.6.11, existe un desbordamiento de búfer de pila en la ruta de recepción DATA_FRAG de Fast-DDS. Un remitente no autenticado puede transmitir un único paquete RTPS DATA_FRAG malformado donde 'fragmentSize' y 'sampleSize' están manipulados para violar suposiciones internas. Debido a un paso de alineación de 4 bytes durante la inicialización de los metadatos del fragmento, el código escribe más allá del final del búfer de carga útil asignado, causando un fallo inmediato (DoS) y potencialmente permitiendo la corrupción de memoria (riesgo de RCE). Las versiones 3.4.1, 3.3.1 y 2.6.11 parchean el problema.

03 Feb 2026, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 20:15

Updated : 2026-02-18 16:11


NVD link : CVE-2025-62799

Mitre link : CVE-2025-62799

CVE.ORG link : CVE-2025-62799


JSON object : View

Products Affected

debian

  • debian_linux

eprosima

  • fast_dds
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write