rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted `CA_SSO_LOGIN_REQ` with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue.
References
Configurations
History
17 Sep 2025, 20:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Rathena
Rathena rathena |
|
CPE | cpe:2.3:a:rathena:rathena:*:*:*:*:*:*:*:* | |
CWE | CWE-787 | |
References | () https://github.com/rathena/rathena/commit/2f5248b9cd9a8c6b42422ddecfc4cc2cd0e69e4b - Patch | |
References | () https://github.com/rathena/rathena/security/advisories/GHSA-4p33-6xqr-cm6x - Vendor Advisory |
09 Sep 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-09 23:15
Updated : 2025-09-17 20:53
NVD link : CVE-2025-58447
Mitre link : CVE-2025-58447
CVE.ORG link : CVE-2025-58447
JSON object : View
Products Affected
rathena
- rathena