When libcurl is asked to perform automatic gzip decompression of
content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,
**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would
make libcurl perform a buffer overflow.
References
Link | Resource |
---|---|
https://curl.se/docs/CVE-2025-0725.html | Vendor Advisory |
https://curl.se/docs/CVE-2025-0725.json | Vendor Advisory |
https://hackerone.com/reports/2956023 | Exploit Issue Tracking |
http://www.openwall.com/lists/oss-security/2025/02/05/3 | Mailing List |
http://www.openwall.com/lists/oss-security/2025/02/06/2 | Mailing List |
http://www.openwall.com/lists/oss-security/2025/02/06/4 | Mailing List |
https://security.netapp.com/advisory/ntap-20250306-0009/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
History
13 May 2025, 18:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
First Time |
Netapp hci H615c
Netapp hci H610s Netapp hci H610s Firmware Netapp hci Baseboard Management Controller Netapp hci H610c Netapp solidfire \& Hci Management Node Netapp hci H615c Firmware Haxx libcurl Haxx Netapp Netapp solidfire \& Hci Storage Node Haxx curl Netapp hci H610c Firmware |
|
CPE | cpe:2.3:h:netapp:hci_h610c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_h615c:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:hci_h610s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:* cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:hci_h610c_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:hci_baseboard_management_controller:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:hci_h615c_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire_\&_hci_storage_node:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_h610s:-:*:*:*:*:*:*:* |
|
References | () https://curl.se/docs/CVE-2025-0725.html - Vendor Advisory | |
References | () https://curl.se/docs/CVE-2025-0725.json - Vendor Advisory | |
References | () https://hackerone.com/reports/2956023 - Exploit, Issue Tracking | |
References | () http://www.openwall.com/lists/oss-security/2025/02/05/3 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2025/02/06/2 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2025/02/06/4 - Mailing List | |
References | () https://security.netapp.com/advisory/ntap-20250306-0009/ - Third Party Advisory |
07 Mar 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
05 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
05 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Feb 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-05 10:15
Updated : 2025-05-13 18:35
NVD link : CVE-2025-0725
Mitre link : CVE-2025-0725
CVE.ORG link : CVE-2025-0725
JSON object : View
Products Affected
netapp
- hci_h610s
- hci_h615c
- hci_h610c_firmware
- solidfire_\&_hci_management_node
- hci_h615c_firmware
- solidfire_\&_hci_storage_node
- hci_baseboard_management_controller
- hci_h610c
- hci_h610s_firmware
haxx
- curl
- libcurl
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')