Vulnerability Details : CVE-2025-1372
A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue.
Vulnerability category: Overflow
Products affected by CVE-2025-1372
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2025-1372
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 5 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2025-1372
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:L/AC:L/Au:S/C:P/I:P/A:P |
3.1
|
6.4
|
VulDB | 2025-02-17 |
5.3
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
1.8
|
3.4
|
VulDB | 2025-02-17 |
4.8
|
MEDIUM | CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/V... |
N/A
|
N/A
|
VulDB | 2025-02-17 |
CWE ids for CVE-2025-1372
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: cna@vuldb.com (Primary)
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: cna@vuldb.com (Primary)
References for CVE-2025-1372
-
https://www.gnu.org/
The GNU Operating System and the Free Software Movement
-
https://vuldb.com/?id.295981
-
https://sourceware.org/bugzilla/show_bug.cgi?id=32656#c3
-
https://vuldb.com/?submit.496485
-
https://sourceware.org/bugzilla/show_bug.cgi?id=32657
-
https://sourceware.org/bugzilla/show_bug.cgi?id=32656
32656 – eu-readelf SEGV (buffer over read) in dump_data_section (src/readelf.c:13312)
-
https://sourceware.org/bugzilla/attachment.cgi?id=15927
-
https://vuldb.com/?ctiid.295981
CVE-2025-1372 GNU elfutils eu-readelf readelf.c print_string_section buffer overflow (Bug 32656)
Jump to