CVE-2025-62689
BaseFortify
Publication date: 2025-11-10
Last updated on: 2025-11-14
Assigner: JPCERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gnu | libmicrohttpd | to 2025-09-16 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in GNU libmicrohttpd version 1.0.2 and earlier. It occurs when a specially crafted packet is sent by an attacker, causing the software to dereference a NULL pointer, which leads to a denial-of-service (DoS) condition by crashing or stopping the service.
How can this vulnerability impact me? :
The impact of this vulnerability is a denial-of-service (DoS) condition. An attacker can exploit it remotely by sending a specially crafted packet, causing the affected service to crash or become unavailable, which can disrupt normal operations and availability of systems using GNU libmicrohttpd.