Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5068 | A lack of input validation allows for out of bounds reads caused by malicious or malformed packets. |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 28 Feb 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zephyrproject
Zephyrproject zephyr |
|
| CPEs | cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zephyrproject
Zephyrproject zephyr |
Tue, 25 Feb 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A lack of input validation allows for out of bounds reads caused by malicious or malformed packets. | |
| Title | Out of bounds read when unpacking DNS answers | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2025-02-28T17:04:15.741Z
Reserved: 2025-02-25T06:02:12.173Z
Link: CVE-2025-1674
Updated: 2025-02-28T17:04:04.266Z
Status : Analyzed
Published: 2025-02-25T08:15:29.887
Modified: 2025-02-28T01:30:32.830
Link: CVE-2025-1674
No data.
OpenCVE Enrichment
No data.
EUVD