In NetX Duo component HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.3, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length smaller than the data request size. A
possible workaround is to disable HTTP PUT support.
This issue follows an uncomplete fix in CVE-2025-0728.
CVSS
No CVSS.
References
Configurations
No configuration.
History
15 Apr 2025, 16:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Apr 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-06 19:15
Updated : 2025-04-15 16:16
NVD link : CVE-2025-2258
Mitre link : CVE-2025-2258
CVE.ORG link : CVE-2025-2258
JSON object : View
Products Affected
No product.
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)