In Eclipse Mosquitto up to version 2.0.18a, an attacker can achieve memory leaking, segmentation fault or heap-use-after-free by sending specific sequences of "CONNECT", "DISCONNECT", "SUBSCRIBE", "UNSUBSCRIBE" and "PUBLISH" packets.CreditsRoman Kraus (Fraunhofer FOKUS)Steffen Lüdtke (Fraunhofer FOKUS)Martin Schneider (Fraunhofer FOKUS)Ramon Barakat (Fraunhofer FOKUS)Referenceshttps://gitlab.eclipse.org/security/vulnerability-reports/-/issues/216https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/217https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/218https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/227https://gitlab.eclipse.org/security/cve-assignement/-/issues/26https://github.com/eclipse/mosquitto/releases/tag/v2.0.19https://mosquitto.org/https://github.com/eclipse-mosquitto/mosquitto/commit/1914b3ee2a18102d0a94cbdbbfeae1afa03edd17