First published: Sun Apr 06 2025(Updated: )
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. A possible workaround is to disable HTTP PUT support. This issue follows an incomplete fix of CVE-2025-0727
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse ThreadX | <6.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2259 has a severity rating of medium due to its potential for denial of service attacks.
To mitigate CVE-2025-2259, upgrade Eclipse ThreadX NetX Duo to version 6.4.3 or later.
CVE-2025-2259 facilitates a denial of service attack by exploiting an integer underflow.
Versions of Eclipse ThreadX NetX Duo prior to 6.4.3 are affected by CVE-2025-2259.
Users of Eclipse ThreadX NetX Duo may experience service disruption due to the denial of service vulnerabilities introduced by CVE-2025-2259.