Metrics
Affected Vendors & Products
No advisories yet.
Solution
Update the library to its latest stable release, if not possible backport the fix commit 2bb9598562b37c942ba5b04bcde3f7fdf66a9d3a
Workaround
No workaround given by the vendor.
Mon, 20 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 20 Oct 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Stack-based Buffer Overflow in lws_adns_parse_label in warmcat libwebsockets allows, when the LWS_WITH_SYS_ASYNC_DNS flag is enabled during compilation, to overflow the label_stack, when the attacker is able to sniff a DNS request in order to craft a response with a matching id containing a label longer than the maximum. | |
Title | Stack-based Buffer Overflow in libwebsockets DNS response parsing | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-20T14:00:37.720Z
Reserved: 2025-10-13T09:56:39.308Z
Link: CVE-2025-11678

Updated: 2025-10-20T14:00:24.521Z

Status : Received
Published: 2025-10-20T14:15:40.137
Modified: 2025-10-20T14:15:40.137
Link: CVE-2025-11678

No data.

No data.