First published: Tue Mar 11 2025(Updated: )
A vulnerability was found in libzvbi up to 0.2.43. It has been declared as problematic. Affected by this vulnerability is the function vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the argument src_length leads to integer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The patch is named ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
libzvbi | <=0.2.43 | |
debian/zvbi | <=0.2.35-18<=0.2.41-1 | 0.2.44-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2174 is classified as a problematic vulnerability due to its potential for causing integer overflow.
To fix CVE-2025-2174, you should update libzvbi to a version later than 0.2.43.
Versions of libzvbi up to and including 0.2.43 are affected by CVE-2025-2174.
CVE-2025-2174 specifically impacts the function vbi_strndup_iconv_ucs2 in the file src/conv.c.
Yes, an attack leveraging CVE-2025-2174 can be launched remotely due to its nature.