Stack-based Buffer Overflow in lws_adns_parse_label in warmcat libwebsockets allows, when the LWS_WITH_SYS_ASYNC_DNS flag is enabled during compilation, to overflow the label_stack, when the attacker is able to sniff a DNS request in order to craft a response with a matching id containing a label longer than the maximum.
Advisories

No advisories yet.

Fixes

Solution

Update the library to its latest stable release, if not possible backport the fix commit 2bb9598562b37c942ba5b04bcde3f7fdf66a9d3a


Workaround

No workaround given by the vendor.

History

Mon, 20 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 14:00:00 +0000

Type Values Removed Values Added
Description Stack-based Buffer Overflow in lws_adns_parse_label in warmcat libwebsockets allows, when the LWS_WITH_SYS_ASYNC_DNS flag is enabled during compilation, to overflow the label_stack, when the attacker is able to sniff a DNS request in order to craft a response with a matching id containing a label longer than the maximum.
Title Stack-based Buffer Overflow in libwebsockets DNS response parsing
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2025-10-20T14:00:37.720Z

Reserved: 2025-10-13T09:56:39.308Z

Link: CVE-2025-11678

cve-icon Vulnrichment

Updated: 2025-10-20T14:00:24.521Z

cve-icon NVD

Status : Received

Published: 2025-10-20T14:15:40.137

Modified: 2025-10-20T14:15:40.137

Link: CVE-2025-11678

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.