CVE-2025-66043
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-11

Last updated on: 2025-12-17

Assigner: Talos

Description
Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 3
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-11
Last Modified
2025-12-17
Generated
2026-05-07
AI Q&A
2025-12-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
libbiosig_project libbiosig to 3.9.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by analyzing MFER files processed by libbiosig 3.9.1 for malformed TLV frames with Tag value 3 where the Length field exceeds 16 bytes. Specifically, scanning for MFER files containing Tag 3 frames with length greater than 17 bytes can indicate potential exploitation attempts. Since the vulnerability arises during file parsing, monitoring for crashes or abnormal behavior in applications using libbiosig when opening MFER files may also help detect exploitation. There are no specific commands provided in the resources, but one could use file inspection tools or write scripts to parse MFER files and check the length fields of Tag 3 TLV frames for suspicious values. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of libbiosig version 3.9.1 for processing MFER files until a patched version is available. Do not open or process untrusted or suspicious MFER files, especially those that could contain maliciously crafted Tag 3 TLV frames with large length fields. Implement input validation or filtering to reject MFER files with Tag 3 length fields exceeding 16 bytes. Additionally, monitor and restrict access to systems processing MFER files to trusted users and environments to reduce exposure. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by analyzing MFER files processed by libbiosig 3.9.1 for the presence of Tag 3 TLV frames with length fields exceeding 16 bytes. Since the vulnerability is triggered by specially crafted MFER files, you can detect it by scanning files for Tag 3 entries with length greater than 16 bytes. Additionally, monitoring applications that use libbiosig for crashes or AddressSanitizer reports when processing MFER files can help detect exploitation attempts. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of libbiosig version 3.9.1 for processing untrusted MFER files, especially those containing Tag 3 TLV frames. Do not process MFER files from untrusted sources until a patched version of libbiosig is available. Implement input validation to reject MFER files with Tag 3 length fields exceeding 16 bytes. Monitoring and restricting access to applications that use libbiosig can also reduce risk. [1]


Can you explain this vulnerability to me?

This vulnerability involves several stack-based buffer overflow issues in the MFER parsing functionality of The Biosig Project libbiosig version 3.9.1. When processing a specially crafted MFER file with Tag 3, these vulnerabilities can be triggered, potentially allowing an attacker to execute arbitrary code by providing a malicious file.


How can this vulnerability impact me? :

The vulnerability can lead to arbitrary code execution on the affected system without requiring any privileges or user interaction. This means an attacker could take full control of the system, potentially leading to data loss, system compromise, or further attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart