{"id":"CVE-2023-33658","details":"A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_msg_get_pub_pid() in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack.","modified":"2026-04-10T04:58:47.197798Z","published":"2023-06-08T12:15:09.240Z","references":[{"type":"FIX","url":"https://github.com/nanomq/NanoNNG/commit/657e6c81c474bdee0e6413483b990e90610030c1"},{"type":"PACKAGE","url":"https://github.com/emqx/nanomq"},{"type":"EVIDENCE","url":"https://github.com/emqx/nanomq/issues/1153"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/emqx/nanomq","events":[{"introduced":"0"},{"last_affected":"c53e056b6957db8ccbfda154fd77a3fb85296bb7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.17.2"}]}},{"type":"GIT","repo":"https://github.com/nanomq/nanonng","events":[{"introduced":"0"},{"fixed":"657e6c81c474bdee0e6413483b990e90610030c1"}]}],"versions":["0.0.1","0.0.2","0.0.3","0.1.0","0.10.1","0.10.5","0.10.8","0.11.0","0.11.2","0.11.3","0.11.5","0.11.8","0.11.82","0.12.0","0.12.1","0.12.2","0.12.5","0.13","0.13.0","0.13.5","0.13.6","0.13.8","0.14.0","0.14.1","0.14.5","0.14.8","0.15.0","0.15.1","0.15.2","0.15.3","0.15.5","0.16.0","0.16.2","0.16.3","0.16.5","0.17.0","0.17.2","0.2.0","0.2.1","0.2.2","0.2.5","0.3.0","0.3.2","0.3.3","0.3.4","0.3.5","0.3.8","0.4.0","0.4.1","0.4.2","0.4.3","0.4.5","0.4.8","0.5.0","0.5.2","0.5.5","0.5.8","0.5.9","0.6.0","0.6.2","0.6.3","0.6.4","0.6.7rc","0.6.8","0.7.0","0.7.2","0.7.3","0.7.4","0.7.4rc","0.7.5","0.7.5rc","0.7.8","0.7.9","0.8.0","0.8.3","0.8.5","0.8.6log","0.9.0","0.9.2","0.9.5","0.9.7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-33658.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}