First published: Fri Feb 21 2025(Updated: )
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length smaller than the data request size. A possible workaround is to disable HTTP PUT support.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse ThreadX NetX Duo | <6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0728 has a severity rating that suggests it can lead to a denial of service due to integer underflow vulnerabilities.
To mitigate CVE-2025-0728, upgrade Eclipse ThreadX NetX Duo to version 6.4.2 or later.
CVE-2025-0728 affects Eclipse ThreadX NetX Duo versions prior to 6.4.2.
CVE-2025-0728 is associated with a denial of service attack caused by specially crafted packets.
While CVE-2025-0728 primarily leads to denial of service, it may indirectly cause data loss if the service is disrupted during critical operations.