CWE-127
Buffer Under-read
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations prior to the targeted buffer.
CVE-2025-20359 (GCVE-0-2025-20359)
Vulnerability from cvelistv5
Published
2025-10-15 16:17
Modified
2025-10-15 17:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-127 - Buffer Under-read
Summary
Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allow an unauthenticated, remote attacker to cause the disclosure of possible sensitive data or cause the Snort 3 Detection Engine to crash.
This vulnerability is due to an error in the logic of buffer handling when the MIME fields of the HTTP header are parsed. This can result in a buffer under-read. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection that is parsed by Snort 3. A successful exploit could allow the attacker to induce one of two possible outcomes: the unexpected restarting of the Snort 3 Detection Engine, which could cause a denial of service (DoS) condition, or information disclosure of sensitive information in the Snort 3 data stream. Due to the under-read condition, it is possible that sensitive information that is not valid connection data could be returned.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Cisco | Cisco Cyber Vision |
Version: 3.0.0 Version: 3.0.2 Version: 3.0.3 Version: 3.0.1 Version: 3.1.0 Version: 3.0.4 Version: 3.1.1 Version: 3.1.2 Version: 3.2.0 Version: 3.0.5 Version: 3.2.1 Version: 3.0.6 Version: 3.2.2 Version: 3.2.3 Version: 3.2.4 Version: 4.0.0 Version: 4.0.1 Version: 4.0.2 Version: 4.0.3 Version: 4.1.0 Version: 4.1.1 Version: 4.1.2 Version: 4.1.3 Version: 4.1.4 Version: 4.2.0 Version: 4.2.1 Version: 4.1.5 Version: 4.2.2 Version: 4.2.X Version: 4.2.3 Version: 4.2.4 Version: 4.2.6 Version: 4.1.6 Version: 4.3.0 Version: 4.3.1 Version: 4.3.2 Version: 4.3.3 Version: 4.4.0 Version: 4.4.1 Version: 4.4.2 Version: 4.4.3 Version: 4.1.7 Version: 5.0.0 Version: 5.0.1 Version: 5.0.2 Version: 5.1.0 Version: 5.1.1 Version: 5.1.2 Version: 5.1.3 Version: 5.2.0 Version: 5.2.1 |
||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20359", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-10-15T17:40:59.232004Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-15T17:43:38.689Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Cyber Vision", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.3" }, { "status": "affected", "version": "3.2.4" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.1.0" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.1.2" }, { "status": "affected", "version": "4.1.3" }, { "status": "affected", "version": "4.1.4" }, { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.2.1" }, { "status": "affected", "version": "4.1.5" }, { "status": "affected", "version": "4.2.2" }, { "status": "affected", "version": "4.2.X" }, { "status": "affected", "version": "4.2.3" }, { "status": "affected", "version": "4.2.4" }, { "status": "affected", "version": "4.2.6" }, { "status": "affected", "version": "4.1.6" }, { "status": "affected", "version": "4.3.0" }, { "status": "affected", "version": "4.3.1" }, { "status": "affected", "version": "4.3.2" }, { "status": "affected", "version": "4.3.3" }, { "status": "affected", "version": "4.4.0" }, { "status": "affected", "version": "4.4.1" }, { "status": "affected", "version": "4.4.2" }, { "status": "affected", "version": "4.4.3" }, { "status": "affected", "version": "4.1.7" }, { "status": "affected", "version": "5.0.0" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.1.0" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1.3" }, { "status": "affected", "version": "5.2.0" }, { "status": "affected", "version": "5.2.1" } ] }, { "defaultStatus": "unknown", "product": "Cisco Secure Firewall Threat Defense (FTD) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.4.2.1" }, { "status": "affected", "version": "7.7.0" }, { "status": "affected", "version": "7.4.2.2" }, { "status": "affected", "version": "7.6.1" }, { "status": "affected", "version": "7.4.2.3" }, { "status": "affected", "version": "7.4.2.4" } ] }, { "defaultStatus": "unknown", "product": "Cisco UTD SNORT IPS Engine Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.17.1S" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "17.3.1a" }, { "status": "affected", "version": "16.6.6" }, { "status": "affected", "version": "16.12.2" }, { "status": "affected", "version": "3.17.0S" }, { "status": "affected", "version": "16.6.5" }, { "status": "affected", "version": "17.2.1r" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "16.6.7a" }, { "status": "affected", "version": "16.6.1" }, { "status": "affected", "version": "16.12.1a" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.4.1a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "16.6.9" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.5.1a" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.4a" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.4.1b" }, { "status": "affected", "version": "17.6.1a" }, { "status": "affected", "version": "16.6.10" }, { "status": "affected", "version": "17.7.1a" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.8.1a" }, { "status": "affected", "version": "16.12.7" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.3a" }, { "status": "affected", "version": "17.7.2" }, { "status": "affected", "version": "17.9.1a" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "16.12.8" }, { "status": "affected", "version": "17.3.7" }, { "status": "affected", "version": "17.9.2a" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.11.1a" }, { "status": "affected", "version": "17.12.1a" }, { "status": "affected", "version": "17.6.6" }, { "status": "affected", "version": "17.3.8" }, { "status": "affected", "version": "17.3.8a" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.12.2" }, { "status": "affected", "version": "17.12.3" }, { "status": "affected", "version": "17.6.7" }, { "status": "affected", "version": "17.12.3a" }, { "status": "affected", "version": "17.12.4" }, { "status": "affected", "version": "17.6.8" }, { "status": "affected", "version": "17.6.8a" }, { "status": "affected", "version": "17.12.4a" }, { "status": "affected", "version": "17.15.2c" }, { "status": "affected", "version": "17.12.4b" }, { "status": "affected", "version": "17.15.2a" }, { "status": "affected", "version": "17.12.5" }, { "status": "affected", "version": "17.15.3a" }, { "status": "affected", "version": "17.15.3" }, { "status": "affected", "version": "17.12.5b" }, { "status": "affected", "version": "17.15.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allow an unauthenticated, remote attacker to cause the disclosure of possible sensitive data or cause the Snort 3 Detection Engine to crash.\r\n\r\nThis vulnerability is due to an error in the logic of buffer handling when the MIME fields of the HTTP header are parsed. This can result in a buffer under-read. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection that is parsed by Snort 3. A successful exploit could allow the attacker to induce one of two possible outcomes: the unexpected restarting of the Snort 3 Detection Engine, which could cause a denial of service (DoS) condition, or information disclosure of sensitive information in the Snort 3 data stream. Due to the under-read condition, it is possible that sensitive information that is not valid connection data could be returned." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-127", "description": "Buffer Under-read", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-15T16:17:31.374Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-snort3-mime-vulns-tTL8PgVH", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-mime-vulns-tTL8PgVH" } ], "source": { "advisory": "cisco-sa-snort3-mime-vulns-tTL8PgVH", "defects": [ "CSCwq15864" ], "discovery": "EXTERNAL" }, "title": "Multiple Cisco Products Snort 3 MIME Information Disclosure or Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20359", "datePublished": "2025-10-15T16:17:31.374Z", "dateReserved": "2024-10-10T19:15:13.258Z", "dateUpdated": "2025-10-15T17:43:38.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-32050 (GCVE-0-2025-32050)
Vulnerability from cvelistv5
Published
2025-04-03 13:36
Modified
2025-09-25 18:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-127 - Buffer Under-read
Summary
A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read.
References
URL | Tags | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Version: 0 ≤ |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-32050", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T14:56:24.491360Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T14:57:28.366Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://gitlab.gnome.org/GNOME/libsoup/", "defaultStatus": "unaffected", "packageName": "libsoup", "versions": [ { "lessThan": "3.6.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::appstream" ], "defaultStatus": "affected", "packageName": "libsoup", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.62.3-8.el8_10", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ], "defaultStatus": "affected", "packageName": "mingw-freetype", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.8-3.el8_10.1", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ], "defaultStatus": "affected", "packageName": "spice-client-win", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:8.10-1", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::appstream" ], "defaultStatus": "affected", "packageName": "libsoup", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.62.3-8.el8_10", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ], "defaultStatus": "affected", "packageName": "libsoup", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.62.3-3.el8_8.4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "libsoup", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.72.0-10.el9_6.1", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.2::appstream" ], "defaultStatus": "affected", "packageName": "libsoup", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.72.0-8.el9_2.4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.4::appstream" ], "defaultStatus": "affected", "packageName": "libsoup", "product": "Red Hat Enterprise Linux 9.4 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:2.72.0-8.el9_4.4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:10" ], "defaultStatus": "unaffected", "packageName": "libsoup3", "product": "Red Hat Enterprise Linux 10", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "libsoup", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7" ], "defaultStatus": "unknown", "packageName": "libsoup", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat" } ], "datePublic": "2025-04-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-127", "description": "Buffer Under-read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-25T18:24:12.806Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2025:4440", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:4440" }, { "name": "RHSA-2025:4508", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:4508" }, { "name": "RHSA-2025:4560", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:4560" }, { "name": "RHSA-2025:4568", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:4568" }, { "name": "RHSA-2025:7436", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:7436" }, { "name": "RHSA-2025:8292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2025:8292" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2025-32050" }, { "name": "RHBZ#2357067", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357067" } ], "timeline": [ { "lang": "en", "time": "2025-04-03T01:17:42.454000+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2025-04-03T00:00:00+00:00", "value": "Made public." } ], "title": "Libsoup: integer overflow in append_param_quoted", "workarounds": [ { "lang": "en", "value": "No mitigation is currently available for this vulnerability." } ], "x_redhatCweChain": "CWE-127: Buffer Under-read" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2025-32050", "datePublished": "2025-04-03T13:36:29.141Z", "dateReserved": "2025-04-03T01:42:14.135Z", "dateUpdated": "2025-09-25T18:24:12.806Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
No mitigation information available for this CWE.
No CAPEC attack patterns related to this CWE.