CVE-2025-64076
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-12-31
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| agronholm | cbor2 | to 5.7.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-191 | The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves multiple issues in the cbor2 library up to version 5.7.0, specifically in the decode_definite_long_string() function of its C extension decoder. First, an integer underflow caused by incorrect variable handling leads to out-of-bounds reads, which can trigger unlimited read operations and resource exhaustion. Second, a memory leak occurs because the code fails to release references to Python objects during processing, causing memory exhaustion when handling large CBOR strings. Both issues can be exploited remotely by sending specially crafted CBOR data with multi-byte UTF-8 characters at specific chunk boundaries, resulting in denial of service through crashes or memory exhaustion.
How can this vulnerability impact me? :
Exploitation of this vulnerability can cause denial of service by crashing the process or exhausting system memory. This can disrupt services that use cbor2's C extension to process untrusted CBOR data, such as web APIs, IoT data collectors, and message queue processors, potentially leading to downtime or degraded performance.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade the cbor2 library to version 5.7.1 or later, where the issue has been fixed. Avoid processing untrusted CBOR data with vulnerable versions of cbor2's C extension decoder until the update is applied.