Integer Overflow Flaw in GLib Affects Vulnerable Software Components
CVE-2025-4373
4.8MEDIUM
Summary
A critical flaw exists in the GLib library that creates an integer overflow condition in the g_string_insert_unichar() function. When an unusually large index is specified for character insertion, the function may cause the position value to wrap around, resulting in a buffer underwrite. This vulnerability could be exploited by attackers to overwrite memory locations, potentially leading to application crashes or enabling arbitrary code execution. Affected applications utilizing the vulnerable GLib functions should be updated to mitigate risks associated with this security issue.
References
CVSS V3.1
Score:
4.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved