Buffer Overflow Vulnerability in Zephyr Project by Zephyr Project RTOS
CVE-2025-1675
8.2HIGH
Key Information:
- Vendor
- Zephyrproject-rtos
- Status
- Zephyr
- Vendor
- CVE Published:
- 25 February 2025
Summary
The vulnerability occurs in the dns_copy_qname function within the dns_pack.c file, where a memcpy operation is conducted without proper validation of the source buffer's size. This flaw allows the possibility of writing beyond the allocated memory boundaries, potentially leading to arbitrary code execution or application crashes. Proper input validation measures are essential to prevent such security issues.
Affected Version(s)
Zephyr * <= 4.0
References
CVSS V3.1
Score:
8.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved