First published: Tue Mar 11 2025(Updated: )
A vulnerability was found in libzvbi up to 0.2.43. It has been classified as problematic. Affected is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to uninitialized pointer. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is identified as 8def647eea27f7fd7ad33ff79c2d6d3e39948dce. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
libzvbi | <=0.2.43 | |
debian/zvbi | <=0.2.35-18<=0.2.41-1 | 0.2.44-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2173 is classified as problematic due to its potential to lead to remote code execution from uninitialized pointers.
To fix CVE-2025-2173, update libzvbi to a version later than 0.2.43.
Versions of libzvbi up to and including 0.2.43 are affected by CVE-2025-2173.
The vulnerable function in CVE-2025-2173 is vbi_strndup_iconv_ucs2 located in src/conv.c.
Yes, CVE-2025-2173 can be exploited remotely due to the nature of the vulnerability.