Bug 2454275 (CVE-2026-5245) - CVE-2026-5245 mongoose: stack-based buffer overflow in mDNS
Summary: CVE-2026-5245 mongoose: stack-based buffer overflow in mDNS
Keywords:
Status: NEW
Alias: CVE-2026-5245
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2454333 2454334 2454335 2454336
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-02 10:01 UTC by OSIDB Bzimport
Modified: 2026-04-02 13:24 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-02 10:01:51 UTC
A vulnerability was found in Cesanta Mongoose up to 7.20. This impacts the function handle_mdns_record of the file mongoose.c of the component mDNS Record Handler. Performing a manipulation of the argument buf results in stack-based buffer overflow. Remote exploitation of the attack is possible. A high degree of complexity is needed for the attack. The exploitability is said to be difficult. The exploit has been made public and could be used. Upgrading to version 7.21 will fix this issue. The patch is named 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.


Note You need to log in before you can comment on or make changes to this bug.