CVE-2025-58447
BaseFortify
Publication date: 2025-09-09
Last updated on: 2025-09-17
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rathena | rathena | to 2025-09-06 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a heap-based buffer overflow in the login server of rAthena, an open-source MMORPG server. A remote attacker can send a specially crafted login request with an oversized token length, causing the server to overwrite adjacent session fields in memory. This can lead to a crash (denial of service) or potentially allow the attacker to execute arbitrary code remotely via heap corruption.
How can this vulnerability impact me? :
The vulnerability can cause the rAthena server to crash, resulting in denial of service. More critically, it may allow a remote attacker to execute arbitrary code on the server, potentially compromising the server's integrity, confidentiality, and availability.
What immediate steps should I take to mitigate this vulnerability?
Update rAthena to include the fix from commit 2f5248b or later, as this commit addresses the heap-based buffer overflow vulnerability in the login server. Until the update is applied, consider restricting access to the login server to trusted networks to reduce exposure.