9.8

CVE-2025-54481

Exploit

A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 8744 of biosig.c on the current master branch (35a819fa), when the Tag is 3:

				else if (tag==3) {
					// character code
					char v[17];		// [1]
					if (len>16) fprintf(stderr,"Warning MFER tag2 incorrect length %i>16\n",len);
					curPos += ifread(&v,1,len,hdr);
					v[len]  = 0;

In this case, the overflowed buffer is the newly-declared `v` \[1\] instead of `buf`. Since `v` is only 17 bytes large, much smaller values of `len` (even those encoded using a single octet) can trigger an overflow in this code path.

Data is provided by the National Vulnerability Database (NVD)
Libbiosig ProjectLibbiosig Version < 3.9.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.14% 0.35
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
talos-cna@cisco.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-121 Stack-based Buffer Overflow

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).