You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, I found the memory of hmq can be easily filled up with a simple MQTT message which has big length field. Sending such message to the server can easily make the server consume excessive memory use and make the server crash down (kill by system). It seems there is an issue in memory allocation and control. This may be a threaten and exploited by attackers to do the Dos attack.
The text was updated successfully, but these errors were encountered:
AAArdu
changed the title
The memory of hmq can be easily filled up, causing ftp-srv excessive memory use and crashed.
The memory of hmq can be easily filled up, causing hmq excessive memory use and crashed.
Jan 6, 2023
A large number of messages are pushed to the topic, and if there is no consumer consumption for a long time, the memory usage of the broker keeps growing and messages keep piling up. How to solve this situation?
Description
Hi, I found the memory of hmq can be easily filled up with a simple MQTT message which has big length field. Sending such message to the server can easily make the server consume excessive memory use and make the server crash down (kill by system). It seems there is an issue in memory allocation and control. This may be a threaten and exploited by attackers to do the Dos attack.
A similar threaten can refer to CVE-2017-7651
Note that even unauthorized attackers can do this.
Environment
docker Ubuntu 20.04.3 LTS with 4GB RAM
hmq (github commit b2e79c3 on Jun 18)
go version go1.19
Attack simulation
run server
run attack script
the attack script (in python) may seems like
Result
the server consumes excessive memory and killed by system.
The text was updated successfully, but these errors were encountered: