AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64.
Metrics
Affected Vendors & Products
References
History
Mon, 01 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ais-catcher Project
Ais-catcher Project ais-catcher |
|
| Vendors & Products |
Ais-catcher Project
Ais-catcher Project ais-catcher |
Mon, 01 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 29 Nov 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64. | |
| Title | AIS-catcher Integer Underflow in MQTT Packet Parsing leading to Heap Buffer Overflow | |
| Weaknesses | CWE-122 CWE-191 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-29T01:57:52.613Z
Updated: 2025-12-01T14:11:01.007Z
Reserved: 2025-11-24T23:01:29.678Z
Link: CVE-2025-66217
Updated: 2025-12-01T13:52:49.406Z
Status : Awaiting Analysis
Published: 2025-11-29T03:15:59.880
Modified: 2025-12-01T15:39:33.110
Link: CVE-2025-66217
No data.