Cyber Posture

CVE-2025-1352

MediumPublic PoC

Published: 16 February 2025

Published
16 February 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS Score 0.0012 30.7th percentile
Risk Priority 10 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2025-1352 is a memory corruption vulnerability (CWE-119) in GNU elfutils version 0.192. It affects the __libdw_thread_tail function within the libdw_alloc.c library of the eu-readelf component, where manipulation of the 'w' argument triggers the issue.

The vulnerability enables remote attacks with no privileges required (PR:N), but exploitation demands high attack complexity (AC:H) and user interaction (UI:R). Successful exploitation results in low-impact confidentiality, integrity, and availability effects (C:L/I:L/A:L), yielding a CVSS 3.1 base score of 5.0. While considered difficult to exploit, a public exploit has been disclosed and may be usable.

Advisories recommend applying the patch with commit hash 2636426a091bd6c6f7f02e49ab20d4cdc6bfc753 to mitigate the issue. Details are documented in Sourceware Bugzilla bug 32650, including an attachment at id=15923, and VULDB entries at ctiid.295960 and id.295960.

Details

CWE(s)
CWE-119

Affected Products

elfutils project
elfutils
0.192

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Memory corruption (CWE-119) in eu-readelf via crafted ELF input enables exploitation for client-side code execution (T1203) or application crashes/DoS (T1499.004) when users process malicious files remotely delivered.

References