{"uuid": "066df6c9-1303-4e01-bde3-545c09ee6eee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6196", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18596", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6196\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in libgepub, a library used to read EPUB files. The software mishandles file size calculations when opening specially crafted EPUB files, leading to incorrect memory allocations. This issue causes the application to crash. Known affected usage includes desktop services like Tumbler, which may process malicious files automatically when browsing directories. While no direct remote attack vectors are confirmed, any application using libgepub to parse user-supplied EPUB content could be vulnerable to a denial of service.\n\ud83d\udccf Published: 2025-06-17T14:29:42.228Z\n\ud83d\udccf Modified: 2025-06-17T14:29:42.228Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-6196\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2373117\n3. https://gitlab.gnome.org/GNOME/libgepub/-/issues/18", "creation_timestamp": "2025-06-17T14:40:04.000000Z"}