7.8
CVE-2025-1253
- EPSS 0.08%
- Veröffentlicht 08.05.2025 08:32:35
- Zuletzt bearbeitet 31.07.2025 15:15:35
- Quelle 3f572a00-62e2-4423-959a-7ea25e
- CVE-Watchlists
- Unerledigt
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Stack-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42, from 5.3.0 before 5.3.*, from 4.5c before 5.2.*.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rti ≫ Connext Professional Version >= 4.5c <= 5.2.3
Rti ≫ Connext Professional Version >= 5.3.0 <= 5.3.1.45
Rti ≫ Connext Professional Version >= 6.0.0 <= 6.0.1.40
Rti ≫ Connext Professional Version >= 6.1.0 < 6.1.2.23
Rti ≫ Connext Professional Version >= 7.0.0 < 7.3.0.7
Rti ≫ Connext Professional Version >= 7.4.0 < 7.5.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.08% | 0.23 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| 3f572a00-62e2-4423-959a-7ea25eff1638 | 6.9 | 0 | 0 |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).