Buffer Overflow Vulnerability in Zephyr Project by Zephyr Project RTOS
CVE-2025-1675

8.2HIGH

Key Information:

Vendor
Zephyrproject-rtos
Status
Zephyr
Vendor
CVE Published:
25 February 2025

Summary

The vulnerability occurs in the dns_copy_qname function within the dns_pack.c file, where a memcpy operation is conducted without proper validation of the source buffer's size. This flaw allows the possibility of writing beyond the allocated memory boundaries, potentially leading to arbitrary code execution or application crashes. Proper input validation measures are essential to prevent such security issues.

Affected Version(s)

Zephyr * <= 4.0

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.