CVE-2025-2176

A vulnerability classified as critical has been found in libzvbi up to 0.2.43. This affects the function vbi_capture_sim_load_caption of the file src/io-sim.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.2.44 is able to address this issue. The identifier of the patch is ca1672134b3e2962cd392212c73f44f8f4cb489f. It is recommended to upgrade the affected component. The code maintainer was informed beforehand about the issues. She reacted very fast and highly professional.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zapping-vbi:zvbi:*:*:*:*:*:*:*:*

History

10 Oct 2025, 20:17

Type Values Removed Values Added
CPE cpe:2.3:a:zapping-vbi:zvbi:*:*:*:*:*:*:*:*
First Time Zapping-vbi
Zapping-vbi zvbi
References () https://github.com/zapping-vbi/zvbi/commit/ca1672134b3e2962cd392212c73f44f8f4cb489f - () https://github.com/zapping-vbi/zvbi/commit/ca1672134b3e2962cd392212c73f44f8f4cb489f - Patch
References () https://github.com/zapping-vbi/zvbi/releases/tag/v0.2.44 - () https://github.com/zapping-vbi/zvbi/releases/tag/v0.2.44 - Release Notes
References () https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf - () https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf - Third Party Advisory
References () https://vuldb.com/?ctiid.299205 - () https://vuldb.com/?ctiid.299205 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.299205 - () https://vuldb.com/?id.299205 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.512802 - () https://vuldb.com/?submit.512802 - Third Party Advisory, VDB Entry
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como crítica en libzvbi hasta la versión 0.2.43. Afecta a la función vbi_capture_sim_load_caption del archivo src/io-sim.c. La manipulación provoca un desbordamiento de enteros. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse. La actualización a la versión 0.2.44 puede solucionar este problema. El identificador del parche es ca1672134b3e2962cd392212c73f44f8f4cb489f. Se recomienda actualizar el componente afectado. La responsable del código fue informada de antemano sobre los problemas. Reaccionó muy rápido y con gran profesionalidad.

11 Mar 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 08:15

Updated : 2025-10-10 20:17


NVD link : CVE-2025-2176

Mitre link : CVE-2025-2176

CVE.ORG link : CVE-2025-2176


JSON object : View

Products Affected

zapping-vbi

  • zvbi
CWE
CWE-189

Numeric Errors

CWE-190

Integer Overflow or Wraparound