CVE-2025-65411
Unknown Unknown - Not Provided
NULL Pointer Dereference in GNU Unrtf src/path.c Causes DoS

Publication date: 2025-12-30

Last updated on: 2025-12-30

Assigner: MITRE

Description
A NULL pointer dereference in the src/path.c component of GNU Unrtf v0.21.10 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the search_path parameter.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gnu unrtf 0.21.10
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a NULL pointer dereference in the src/path.c component of GNU Unrtf version 0.21.10. It occurs when the program improperly handles the search_path parameter, allowing an attacker to inject a crafted payload that causes the unrtf process to crash by dereferencing a NULL pointer, leading to a Denial of Service (DoS). [1]


How can this vulnerability impact me? :

The vulnerability can cause the GNU Unrtf application to crash unexpectedly, resulting in a Denial of Service (DoS). This means that any service or system relying on unrtf for processing RTF documents could be disrupted or become unavailable when exposed to a maliciously crafted input exploiting this flaw. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability causes the unrtf process to crash due to a NULL pointer dereference when processing a crafted payload in the search_path parameter. Detection can be done by running unrtf version 0.21.10 with suspicious or crafted RTF files that target the search_path parameter and observing if the process crashes. Specific commands are not provided in the resources, but testing with unrtf on crafted inputs and monitoring for crashes would be the approach. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include reviewing and applying the patch submitted via the Savannah Bug Tracker (entry #67671) once available, or upgrading to a fixed version of unrtf if released. Until a patch is applied, avoid processing untrusted RTF files with unrtf version 0.21.10 to prevent denial of service via crafted payloads. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart