fkie_cve-2025-4948
Vulnerability from fkie_nvd
Published
2025-05-19 16:15
Modified
2025-07-30 15:15
Severity ?
Summary
A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk." }, { "lang": "es", "value": "Se encontr\u00f3 una falla en la funci\u00f3n soup_multipart_new_from_message() de la librer\u00eda HTTP libsoup, com\u00fanmente utilizada por GNOME y otras aplicaciones para gestionar las comunicaciones web. El problema ocurre cuando la librer\u00eda procesa mensajes multiparte especialmente manipulados. Debido a una validaci\u00f3n incorrecta, un c\u00e1lculo interno puede fallar, provocando un desbordamiento de enteros. Esto puede provocar que el programa acceda a memoria no v\u00e1lida y se bloquee. Como resultado, cualquier aplicaci\u00f3n o servidor que utilice libsoup podr\u00eda verse obligado a cerrarse inesperadamente, creando un riesgo de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2025-4948", "lastModified": "2025-07-30T15:15:34.467", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" } ] }, "published": "2025-05-19T16:15:36.790", "references": [ { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8126" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8128" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8132" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8139" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8140" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8252" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8480" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8481" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8482" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:8663" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2025:9179" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/security/cve/CVE-2025-4948" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367183" }, { "source": "secalert@redhat.com", "url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/449" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-191" } ], "source": "secalert@redhat.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…