Metrics
Affected Vendors & Products
No advisories yet.
Solution
Update the library to its latest stable release, if not possible backport the fix commit 7df24cca7144d7bc9233b6b0a71108bd154ce101
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Warmcat
Warmcat libwebsockets |
|
| Vendors & Products |
Warmcat
Warmcat libwebsockets |
Tue, 21 Oct 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 20 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Out-of-bounds Read in lws_upng_emit_next_line in warmcat libwebsockets allows, when the LWS_WITH_UPNG flag is enabled during compilation and the HTML display stack is used, to read past a heap allocated buffer possibly causing a crash, when the user visits an attacker controlled website that contains a crafted PNG file with a big height dimension. | |
| Title | Out-of-bounds Read in libwebsockets PNG parsing | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-20T14:03:41.592Z
Reserved: 2025-10-13T09:56:49.533Z
Link: CVE-2025-11679
Updated: 2025-10-20T14:03:20.604Z
Status : Awaiting Analysis
Published: 2025-10-20T14:15:40.353
Modified: 2025-10-21T19:31:25.450
Link: CVE-2025-11679
OpenCVE Enrichment
Updated: 2025-10-21T09:39:43Z