CVE-2025-6499

A vulnerability classified as problematic was found in vstakhov libucl up to 0.9.2. Affected by this vulnerability is the function ucl_parse_multiline_string of the file src/ucl_parser.c. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/user-attachments/files/19825399/libucl_crash.txt Exploit
https://github.com/vstakhov/libucl/issues/319 Exploit Issue Tracking
https://vuldb.com/?ctiid.313615 Permissions Required VDB Entry
https://vuldb.com/?id.313615 Third Party Advisory VDB Entry
https://vuldb.com/?submit.601011 Third Party Advisory VDB Entry
https://github.com/vstakhov/libucl/issues/319 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:vstakhov:libucl:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-06-23 03:15

Updated : 2025-09-18 13:06


NVD link : CVE-2025-6499

Mitre link : CVE-2025-6499

CVE.ORG link : CVE-2025-6499


JSON object : View

Products Affected

vstakhov

  • libucl
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write