Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-13972 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Stack-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42, from 5.3.0 before 5.3.*, from 4.5c before 5.2.*. |
| Link | Providers |
|---|---|
| https://www.rti.com/vulnerabilities/#cve-2025-1253 |
|
Thu, 31 Jul 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 4.5 before 6.1.2.23. | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Stack-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42, from 5.3.0 before 5.3.*, from 4.5c before 5.2.*. |
| Title | Potential stack buffer write overflow in license-managed Core Libraries when setting RTI_LICENSE_FILE environment variable | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Stack-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags. |
| Weaknesses | CWE-121 |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 05 Jun 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rti
Rti connext Professional |
|
| CPEs | cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rti
Rti connext Professional |
|
| Metrics |
cvssV3_1
|
Thu, 08 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 May 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 4.5 before 6.1.2.23. | |
| Title | Potential stack buffer write overflow in license-managed Core Libraries when setting RTI_LICENSE_FILE environment variable | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: RTI
Published:
Updated: 2025-12-16T16:14:01.391Z
Reserved: 2025-02-12T15:31:54.861Z
Link: CVE-2025-1253
Updated: 2025-05-08T14:04:24.693Z
Status : Modified
Published: 2025-05-08T09:15:19.233
Modified: 2025-07-31T15:15:35.943
Link: CVE-2025-1253
No data.
OpenCVE Enrichment
No data.
EUVD