First published: Wed Feb 05 2025(Updated: )
When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.
Credit: 2499f714-1537-4658-8207-48ae4bb9eae9
Affected Software | Affected Version | How to fix |
---|---|---|
Libcurl | <1.2.0.3 | |
Curl | >=7.10.5<8.12.0 | |
libcurl | >=7.10.5<8.12.0 | |
NetApp HCI Baseboard Management Controller | ||
All of | ||
NetApp HCI H610S Firmware | ||
NetApp HCI H610S Firmware | ||
All of | ||
Netapp Hci H610c Firmware | ||
Netapp Hci H610c | ||
All of | ||
Netapp Hci H615c Firmware | ||
Netapp Hci H615c | ||
NetApp SolidFire & HCI Management Node | ||
NetApp SolidFire & HCI Storage Node |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0725 has a critical severity due to the potential for an integer overflow leading to a buffer overflow.
To fix CVE-2025-0725, upgrade your libcurl to a version later than 1.2.0.3.
CVE-2025-0725 affects libcurl versions 1.2.0.3 and older.
CVE-2025-0725 can allow attackers to execute arbitrary code through a buffer overflow exploit.
Yes, using versions of libcurl newer than 1.2.0.3 mitigates the vulnerability identified in CVE-2025-0725.