CVE-2025-6499

A vulnerability classified as problematic was found in vstakhov libucl up to 0.9.2. Affected by this vulnerability is the function ucl_parse_multiline_string of the file src/ucl_parser.c. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/user-attachments/files/19825399/libucl_crash.txt Exploit
https://github.com/vstakhov/libucl/issues/319 Exploit Issue Tracking
https://vuldb.com/?ctiid.313615 Permissions Required VDB Entry
https://vuldb.com/?id.313615 Third Party Advisory VDB Entry
https://vuldb.com/?submit.601011 Third Party Advisory VDB Entry
https://github.com/vstakhov/libucl/issues/319 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:vstakhov:libucl:*:*:*:*:*:*:*:*

History

18 Sep 2025, 13:06

Type Values Removed Values Added
References () https://github.com/user-attachments/files/19825399/libucl_crash.txt - () https://github.com/user-attachments/files/19825399/libucl_crash.txt - Exploit
References () https://github.com/vstakhov/libucl/issues/319 - () https://github.com/vstakhov/libucl/issues/319 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.313615 - () https://vuldb.com/?ctiid.313615 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.313615 - () https://vuldb.com/?id.313615 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.601011 - () https://vuldb.com/?submit.601011 - Third Party Advisory, VDB Entry
CWE CWE-787
First Time Vstakhov libucl
Vstakhov
CPE cpe:2.3:a:vstakhov:libucl:*:*:*:*:*:*:*:*

23 Jun 2025, 20:16

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad clasificada como problemática en vstakhov libucl hasta la versión 0.9.2. Esta vulnerabilidad afecta a la función ucl_parse_multiline_string del archivo src/ucl_parser.c. La manipulación provoca un desbordamiento del búfer en el montón. El ataque debe abordarse localmente. Se ha hecho público el exploit y puede que sea utilizado.

23 Jun 2025, 14:15

Type Values Removed Values Added
References () https://github.com/vstakhov/libucl/issues/319 - () https://github.com/vstakhov/libucl/issues/319 -

23 Jun 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-23 03:15

Updated : 2025-09-18 13:06


NVD link : CVE-2025-6499

Mitre link : CVE-2025-6499

CVE.ORG link : CVE-2025-6499


JSON object : View

Products Affected

vstakhov

  • libucl
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write