CVE-2025-65410

Name
CVE-2025-65410
Description
A stack overflow in the src/main.c component of GNU Unrtf v0.21.10 allows attackers to cause a Denial of Service (DoS) via injecting a crafted input into the filename parameter.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
cve@mitre.org https://hg.savannah.gnu.org/hgweb/unrtf/rev/a5d3b025a8b1
cve@mitre.org https://lists.gnu.org/archive/html/bug-unrtf/2025-11/msg00001.html
cve@mitre.org https://savannah.gnu.org/projects/unrtf/
cve@mitre.org https://www.gnu.org/software/unrtf/
cve@mitre.org https://github.com/MAXEUR5/Vulnerability_Disclosures/blob/main/2025/CVE-2025-65410.md

Match rules

CPE URI Source package Min version Max version
n/a == n/a == None
cpe:2.3:a:unrtf_project:unrtf:0.21.10:*:*:*:*:*:*:* unrtf == None == 0.21.10

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
unrtf edge-community 0.21.10-r3 Celeste <cielesti@protonmail.com> possibly vulnerable
unrtf 3.23-community 0.21.10-r3 Celeste <cielesti@protonmail.com> possibly vulnerable