When libcurl is asked to perform automatic gzip decompression of
content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,
**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would
make libcurl perform a buffer overflow.
References
Link | Resource |
---|---|
https://curl.se/docs/CVE-2025-0725.html | Vendor Advisory |
https://curl.se/docs/CVE-2025-0725.json | Vendor Advisory |
https://hackerone.com/reports/2956023 | Exploit Issue Tracking |
http://www.openwall.com/lists/oss-security/2025/02/05/3 | Mailing List |
http://www.openwall.com/lists/oss-security/2025/02/06/2 | Mailing List |
http://www.openwall.com/lists/oss-security/2025/02/06/4 | Mailing List |
https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7 | |
https://security.netapp.com/advisory/ntap-20250306-0009/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
History
12 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 May 2025, 18:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://curl.se/docs/CVE-2025-0725.html - Vendor Advisory | |
References | () https://curl.se/docs/CVE-2025-0725.json - Vendor Advisory | |
References | () https://hackerone.com/reports/2956023 - Exploit, Issue Tracking | |
References | () http://www.openwall.com/lists/oss-security/2025/02/05/3 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2025/02/06/2 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2025/02/06/4 - Mailing List | |
References | () https://security.netapp.com/advisory/ntap-20250306-0009/ - Third Party Advisory | |
CWE | CWE-120 | |
CPE | cpe:2.3:a:netapp:solidfire_\&_hci_storage_node:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:hci_h610c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_h610s:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:* cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:hci_h615c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_h615c:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:hci_h610s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_h610c:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:hci_baseboard_management_controller:-:*:*:*:*:*:*:* |
|
First Time |
Netapp hci H615c
Netapp hci H610c Netapp solidfire \& Hci Storage Node Netapp hci Baseboard Management Controller Haxx Haxx libcurl Netapp hci H615c Firmware Netapp hci H610c Firmware Netapp hci H610s Haxx curl Netapp Netapp hci H610s Firmware Netapp solidfire \& Hci Management Node |
07 Mar 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
05 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
05 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Feb 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-05 10:15
Updated : 2025-06-12 16:15
NVD link : CVE-2025-0725
Mitre link : CVE-2025-0725
CVE.ORG link : CVE-2025-0725
JSON object : View
Products Affected
haxx
- curl
- libcurl
netapp
- hci_h610s_firmware
- hci_h615c_firmware
- hci_h610c
- hci_baseboard_management_controller
- solidfire_\&_hci_storage_node
- hci_h610s
- solidfire_\&_hci_management_node
- hci_h615c
- hci_h610c_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')