Home

Description

In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. A possible workaround is to disable HTTP PUT support. This issue follows an incomplete fix of CVE-2025-0727

PUBLISHED Reserved 2025-03-12 | Published 2025-04-06 | Updated 2025-04-14 | Assigner eclipse




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-191: Integer Underflow (Wrap or Wraparound)

Product status

Default status
unaffected

Any version before 6.4.2
affected

Credits

Kelly Patterson of Cisco Talos finder

References

www.talosintelligence.com/...ability_reports/TALOS-2024-2104

github.com/...ommit/fb3195bbb6d0d6fe71a7a19585c008623c217f9e patch

github.com/...etxduo/security/advisories/GHSA-chhp-gmxc-46rq vendor-advisory

cve.org (CVE-2025-2259)

nvd.nist.gov (CVE-2025-2259)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.