CVE-2025-65410
Stack Overflow in GNU Unrtf src/main.c Causes DoS
Publication date: 2025-12-23
Last updated on: 2025-12-23
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gnu | unrtf | 0.21.10 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-65410 is a stack-based buffer overflow vulnerability in the src/main.c component of GNU Unrtf version 0.21.10. It occurs due to improper handling of the filename parameter, allowing attackers to inject crafted input that overflows the stack. This can cause the unrtf process to crash and potentially enable an attacker to hijack the return address, leading to arbitrary code execution. [3]
How can this vulnerability impact me? :
This vulnerability can cause a Denial of Service (DoS) by crashing the unrtf process. More severely, it may allow an attacker to execute arbitrary code on the affected system by exploiting the stack overflow and hijacking the return address, potentially compromising system security. [3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for crashes or abnormal termination of the unrtf process when processing input files, especially those with crafted filenames. Since the vulnerability involves a stack-based buffer overflow triggered by the filename parameter, testing with specially crafted inputs can reveal the issue. However, no specific detection commands are provided in the available resources. [3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding the use of unrtf version 0.21.10 until a patch is applied. Applying the patch submitted via Savannah Bug Tracker entries #67666 and #67667 once available is recommended. Additionally, restrict untrusted input files and monitor unrtf process behavior to prevent exploitation. Coordinated disclosure suggests waiting for the official fix before public use. [3]