Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-3408

Опубликовано: 08 апр. 2025
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in Nothings stb up to f056911. It has been rated as critical. Affected by this issue is the function stb_dupreplace. The manipulation leads to integer overflow. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstbunfixedpackage
libstbpostponedtrixiepackage
libstbpostponedbookwormpackage
libstbpostponedbullseyepackage

Примечания

  • https://github.com/nothings/stb/issues/1770

EPSS

Процентиль: 48%
0.00246
Низкий

Связанные уязвимости

CVSS3: 6.3
ubuntu
10 месяцев назад

A vulnerability was found in Nothings stb up to f056911. It has been rated as critical. Affected by this issue is the function stb_dupreplace. The manipulation leads to integer overflow. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
nvd
10 месяцев назад

A vulnerability was found in Nothings stb up to f056911. It has been rated as critical. Affected by this issue is the function stb_dupreplace. The manipulation leads to integer overflow. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
github
10 месяцев назад

A vulnerability was found in Nothings stb up to f056911. It has been rated as critical. Affected by this issue is the function stb_dupreplace. The manipulation leads to integer overflow. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 48%
0.00246
Низкий