First published: Sun Apr 06 2025(Updated: )
In NetX Duo component HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length smaller than the data request size. A possible workaround is to disable HTTP PUT support. This issue follows an uncomplete fix in CVE-2025-0728.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse ThreadX | <6.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2258 is classified as a denial-of-service vulnerability, which can significantly affect the availability of the affected system.
To mitigate CVE-2025-2258, update Eclipse ThreadX NetX Duo to version 6.4.3 or later.
CVE-2025-2258 is caused by an integer underflow issue in the HTTP server functionality when processing packets with a Content-Length smaller than the actual data.
Versions of Eclipse ThreadX NetX Duo prior to 6.4.3 are affected by CVE-2025-2258.
An attacker can exploit CVE-2025-2258 to induce a denial of service by writing a very large file through specially crafted HTTP packets.