First published: Fri Feb 21 2025(Updated: )
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. A possible workaround is to disable HTTP PUT support.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse ThreadX NetX Duo | <6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0727 has been classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2025-0727, update Eclipse ThreadX NetX Duo to version 6.4.2 or later.
CVE-2025-0727 exploits an integer underflow in the HTTP server functionality.
The potential impacts of CVE-2025-0727 include denial of service due to the ability to write excessively large files.
CVE-2025-0727 affects users of Eclipse ThreadX NetX Duo versions prior to 6.4.2.