version 6.4.2, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length smaller than the data request size. A
possible workaround is to disable HTTP PUT support.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5085 | In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length smaller than the data request size. A possible workaround is to disable HTTP PUT support. |
Thu, 31 Jul 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse threadx Netx Duo |
|
| CPEs | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Eclipse
Eclipse threadx Netx Duo |
|
| Metrics |
cvssV3_1
|
Fri, 21 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 21 Feb 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length smaller than the data request size. A possible workaround is to disable HTTP PUT support. | |
| Title | Eclipse ThreadX NetX Duo HTTP server single PUT request integer underflow | |
| Weaknesses | CWE-191 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-02-21T14:12:36.893Z
Reserved: 2025-01-27T08:46:27.067Z
Link: CVE-2025-0728
Updated: 2025-02-21T14:07:30.305Z
Status : Analyzed
Published: 2025-02-21T09:15:10.077
Modified: 2025-07-31T16:33:10.073
Link: CVE-2025-0728
No data.
OpenCVE Enrichment
No data.
EUVD