In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.3, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length in one packet smaller than the data
request size of the other packet. A possible workaround is to disable
HTTP PUT support.
This issue follows an incomplete fix of CVE-2025-0727
Metrics
Affected Vendors & Products
References
History
Mon, 14 Apr 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 07 Apr 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 06 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. A possible workaround is to disable HTTP PUT support. This issue follows an incomplete fix of CVE-2025-0727 | |
Title | Eclipse ThreadX NetX Duo component HTTP server single PUT request integer underflow | |
Weaknesses | CWE-191 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: eclipse
Published: 2025-04-06T19:01:20.233Z
Updated: 2025-04-14T15:03:15.118Z
Reserved: 2025-03-12T17:29:26.418Z
Link: CVE-2025-2259

Updated: 2025-04-14T15:03:15.118Z

Status : Awaiting Analysis
Published: 2025-04-06T19:15:41.020
Modified: 2025-04-14T15:15:24.383
Link: CVE-2025-2259

No data.