A vulnerability classified as problematic was found in vstakhov libucl up to 0.9.2. Affected by this vulnerability is the function ucl_parse_multiline_string of the file src/ucl_parser.c. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/user-attachments/files/19825399/libucl_crash.txt | Exploit |
https://github.com/vstakhov/libucl/issues/319 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.313615 | Permissions Required VDB Entry |
https://vuldb.com/?id.313615 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.601011 | Third Party Advisory VDB Entry |
https://github.com/vstakhov/libucl/issues/319 | Exploit Issue Tracking |
Configurations
History
18 Sep 2025, 13:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/user-attachments/files/19825399/libucl_crash.txt - Exploit | |
References | () https://github.com/vstakhov/libucl/issues/319 - Exploit, Issue Tracking | |
References | () https://vuldb.com/?ctiid.313615 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.313615 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.601011 - Third Party Advisory, VDB Entry | |
CWE | CWE-787 | |
First Time |
Vstakhov libucl
Vstakhov |
|
CPE | cpe:2.3:a:vstakhov:libucl:*:*:*:*:*:*:*:* |
23 Jun 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
23 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/vstakhov/libucl/issues/319 - |
23 Jun 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-23 03:15
Updated : 2025-09-18 13:06
NVD link : CVE-2025-6499
Mitre link : CVE-2025-6499
CVE.ORG link : CVE-2025-6499
JSON object : View
Products Affected
vstakhov
- libucl