CVE-2025-25052

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*
cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*

History

09 May 2025, 19:07

Type Values Removed Values Added
CPE cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*
First Time Openatom openharmony
Openatom
References () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md - () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-05.md - Third Party Advisory

07 May 2025, 14:13

Type Values Removed Values Added
Summary
  • (es) En OpenHarmony v5.0.3 y versiones anteriores permiten que un atacante local provoque un DOS a través de un desbordamiento del búfer.

06 May 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-06 09:15

Updated : 2025-05-09 19:07


NVD link : CVE-2025-25052

Mitre link : CVE-2025-25052

CVE.ORG link : CVE-2025-25052


JSON object : View

Products Affected

openatom

  • openharmony
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')