Home

Description

Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, an unchecked vsnprintf return in SStream_concat lets a malicious cs_opt_mem.vsnprintf drive SStream’s index negative or past the end, leading to a stack buffer underflow/overflow when the next write occurs. Commit 2c7797182a1618be12017d7d41e0b6581d5d529e fixes the issue.

PUBLISHED Reserved 2025-12-15 | Published 2025-12-17 | Updated 2025-12-18 | Assigner GitHub_M




MEDIUM: 4.8CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

Problem types

CWE-124: Buffer Underwrite ('Buffer Underflow')

CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

<= 6.0.0-Alpha5
affected

References

github.com/...pstone/security/advisories/GHSA-85f5-6xr3-q76r exploit

github.com/...pstone/security/advisories/GHSA-85f5-6xr3-q76r

github.com/...ommit/2c7797182a1618be12017d7d41e0b6581d5d529e

cve.org (CVE-2025-68114)

nvd.nist.gov (CVE-2025-68114)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.