First published: Tue Feb 13 2024(Updated: )
Insufficient file size checks resulted in a denial of service risk in the file picker's unzip functionality.
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/moodle | <4.3.3 | 4.3.3 |
redhat/4.2.6 and | <4.1.9 | 4.1.9 |
composer/moodle/moodle | <4.1.9 | 4.1.9 |
composer/moodle/moodle | >=4.2.0<4.2.6 | 4.2.6 |
composer/moodle/moodle | >=4.3.0<4.3.3 | 4.3.3 |
Moodle | >=4.1.0<4.1.9 | |
Moodle | >=4.2.0<4.2.6 | |
Moodle | >=4.3.0<4.3.3 | |
Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25978 is classified as a denial of service vulnerability due to insufficient file size checks in the file picker’s unzip functionality.
To fix CVE-2024-25978, upgrade Moodle to at least version 4.1.9, 4.2.6, or 4.3.3 depending on your current version.
CVE-2024-25978 affects multiple versions of Moodle including versions below 4.1.9 and certain ranges of versions 4.2.0 to 4.2.6, and 4.3.0 to 4.3.3.
The potential impact of CVE-2024-25978 includes service unavailability resulting from the exploitation of the denial of service vulnerability.
Yes, a patch is available through the respective Moodle updates for affected versions.