CVE-2025-65411
NULL Pointer Dereference in GNU Unrtf src/path.c Causes DoS
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gnu | unrtf | 0.21.10 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the src/path.c component of GNU Unrtf version 0.21.10. It occurs when the program improperly handles the search_path parameter, allowing an attacker to inject a crafted payload that causes the unrtf process to crash by dereferencing a NULL pointer, leading to a Denial of Service (DoS). [1]
How can this vulnerability impact me? :
The vulnerability can cause the GNU Unrtf application to crash unexpectedly, resulting in a Denial of Service (DoS). This means that any service or system relying on unrtf for processing RTF documents could be disrupted or become unavailable when exposed to a maliciously crafted input exploiting this flaw. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability causes the unrtf process to crash due to a NULL pointer dereference when processing a crafted payload in the search_path parameter. Detection can be done by running unrtf version 0.21.10 with suspicious or crafted RTF files that target the search_path parameter and observing if the process crashes. Specific commands are not provided in the resources, but testing with unrtf on crafted inputs and monitoring for crashes would be the approach. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include reviewing and applying the patch submitted via the Savannah Bug Tracker (entry #67671) once available, or upgrading to a fixed version of unrtf if released. Until a patch is applied, avoid processing untrusted RTF files with unrtf version 0.21.10 to prevent denial of service via crafted payloads. [1]