First published: Mon Feb 10 2025(Updated: )
### Summary An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attemps to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. ### Details A similar issue was previously reported in https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. ### PoC The PoC is the same as for https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv with the detail that the file should only contain null-bytes; 0x00. When the null-bytes are encountered by the `InputStreamReader`, it will issue replacement characters in its charset decoding, which will fill up the line-buffer in the `BufferedReader.readLine()`, because the replacement character is not a line-break character. ### Impact Impact is the same as https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.netty:netty-common | <4.1.118.Final | 4.1.118.Final |
NettyRPC | <4.1.118 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25193 is categorized as a critical vulnerability due to its potential to cause denial of service.
To resolve CVE-2025-25193, upgrade to Netty version 4.1.119 or later.
CVE-2025-25193 affects Netty versions up to and including 4.1.118.
Exploiting CVE-2025-25193 can lead to application crashes and unavailability due to denial of service.
Yes, CVE-2025-25193 specifically affects Netty running on Windows applications.