Out-of-Bounds Write Vulnerability in musl libc Affects Multiple Versions
CVE-2025-26519

8.1HIGH

Key Information:

Vendor

Musl-libc

Status
Vendor
CVE Published:
14 February 2025

What is CVE-2025-26519?

CVE-2025-26519 is a noteworthy vulnerability found in musl libc, a lightweight C standard library widely used in Linux-based environments. This out-of-bounds write vulnerability arises during the process of converting untrusted EUC-KR text to UTF-8, potentially allowing malicious actors to manipulate memory in ways that can disrupt system integrity. Organizations relying on musl libc for their software applications may face significant risks, including unauthorized access to memory and potential system crashes, which can severely affect operational continuity and data security.

Technical Details

The vulnerability affects musl libc versions ranging from 0.9.13 to 1.2.5 prior to 1.2.6. The out-of-bounds write occurs when the iconv function is poorly handling specific character set conversions involving EUC-KR text. An attacker possessing the capability to invoke this conversion with untrusted input can exploit this flaw to write data outside of the intended buffer, jeopardizing the stability and security of applications utilizing this library.

Potential Impact of CVE-2025-26519

  1. Memory Corruption: The out-of-bounds write can overwite memory locations, leading to unpredictable behavior in applications, which can cause crashes or corruption of critical data.

  2. System Compromise: Attackers could leverage this vulnerability to gain unauthorized access to the system, potentially allowing them to execute arbitrary code or escalate privileges within the operating environment.

  3. Operational Disruption: A successful exploit could lead to system downtime, data loss, and disruptions in service, which can have dire consequences for businesses relying on musl libc-based applications, impacting productivity and trust.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

musl 0.9.13 < 1.2.6

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.