Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-0725

Опубликовано: 05 фев. 2025
Источник: redhat
CVSS3: 4
EPSS Низкий

Описание

When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.

A flaw was found in libcurl. This vulnerability allows an attacker to trigger a buffer overflow via an integer overflow in zlib 1.2.0.3 or older when libcurl performs automatic gzip decompression.

Отчет

This CVE is not applicable to any supported version of Red Hat Enterprise Linux since RHEL-4.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Confidential Compute Attestationconfidential-compute-attestation-tech-preview/trustee-rhel9Not affected
Red Hat Enterprise Linux 10curlNot affected
Red Hat Enterprise Linux 10s390utilsNot affected
Red Hat Enterprise Linux 6curlNot affected
Red Hat Enterprise Linux 7curlNot affected
Red Hat Enterprise Linux 8curlNot affected
Red Hat Enterprise Linux 9curlNot affected
Red Hat JBoss Core ServicescurlNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-680
https://bugzilla.redhat.com/show_bug.cgi?id=2343899libcurl: Buffer Overflow in libcurl via zlib Integer Overflow

EPSS

Процентиль: 34%
0.00135
Низкий

4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
5 месяцев назад

When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.

CVSS3: 7.3
nvd
5 месяцев назад

When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.

CVSS3: 7.3
msrc
4 месяца назад

Описание отсутствует

CVSS3: 7.3
debian
5 месяцев назад

When libcurl is asked to perform automatic gzip decompression of conte ...

CVSS3: 7.3
github
5 месяцев назад

When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.

EPSS

Процентиль: 34%
0.00135
Низкий

4 Medium

CVSS3