CVE-2025-66044
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-11

Last updated on: 2025-12-17

Assigner: Talos

Description
Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 64
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-11
Last Modified
2025-12-17
Generated
2026-05-07
AI Q&A
2025-12-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
libbiosig_project libbiosig to 3.9.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves several stack-based buffer overflow issues in the MFER parsing functionality of The Biosig Project libbiosig version 3.9.1. When processing a specially crafted MFER file, these vulnerabilities can be triggered, potentially allowing an attacker to execute arbitrary code by providing a malicious file.


How can this vulnerability impact me? :

The vulnerability can lead to arbitrary code execution on the affected system without any user interaction or privileges required. This means an attacker could take full control of the system, potentially leading to data loss, system compromise, or further attacks.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves identifying the presence of malicious MFER files crafted to exploit the buffer overflow in libbiosig 3.9.1. Since the vulnerability is triggered by MFER files with a Tag 3 TLV frame containing a length field exceeding the buffer size (greater than 17 bytes), you can scan for such files. One approach is to analyze MFER files for suspiciously large length fields in Tag 3 frames. Additionally, monitoring applications using libbiosig for crashes or abnormal behavior when processing MFER files can indicate exploitation attempts. Specific commands are not provided in the resources, but using file inspection tools or custom scripts to parse MFER files and check TLV frames for length fields over 17 bytes can help detect malicious files. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include preventing the processing of untrusted or unauthenticated MFER files by applications using libbiosig 3.9.1. Restrict or block the intake of MFER files from untrusted sources. If possible, update or patch libbiosig to a version where this vulnerability is fixed. As a temporary workaround, implement input validation to reject MFER files with Tag 3 TLV frames having length fields greater than 17 bytes to avoid triggering the buffer overflow. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by analyzing MFER files processed by libbiosig 3.9.1 for malformed TLV frames, specifically those with Tag value 3 and length fields exceeding 16 bytes. Detection involves inspecting MFER files for unusually large length fields in Tag 3 frames. Since the vulnerability is triggered by processing malicious MFER files, monitoring file inputs to libbiosig or applications using it (e.g., Octave, Matlab) for suspicious MFER files is recommended. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of libbiosig version 3.9.1 for processing untrusted MFER files, especially those containing Tag 3 TLV frames with length fields greater than 16 bytes. Restrict or validate input MFER files to ensure they do not contain maliciously crafted data. Applying patches or updates from the libbiosig project once available is also recommended. Since no direct mitigation commands or patches are detailed in the resources, restricting or validating input files is the advised immediate action. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart