First published: Wed Feb 05 2025(Updated: )
When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.
Credit: 2499f714-1537-4658-8207-48ae4bb9eae9
Affected Software | Affected Version | How to fix |
---|---|---|
curl libcurl | <1.2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0725 has a critical severity due to the potential for an integer overflow leading to a buffer overflow.
To fix CVE-2025-0725, upgrade your libcurl to a version later than 1.2.0.3.
CVE-2025-0725 affects libcurl versions 1.2.0.3 and older.
CVE-2025-0725 can allow attackers to execute arbitrary code through a buffer overflow exploit.
Yes, using versions of libcurl newer than 1.2.0.3 mitigates the vulnerability identified in CVE-2025-0725.