Description
In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception.
Remediation
References
https://bugs.eclipse.org/bugs/show_bug.cgi?id=567068
Related Vulnerabilities
CVE-2018-25079 Vulnerability in maven package org.webjars.npm:is-url
CVE-2020-25633 Vulnerability in maven package org.jboss.resteasy:resteasy-client
CVE-2023-33938 Vulnerability in maven package com.liferay.portal:release.portal.bom
CVE-2023-30542 Vulnerability in npm package @openzeppelin/contracts-upgradeable
CVE-2023-29204 Vulnerability in maven package org.xwiki.platform:xwiki-platform-oldcore