CVE-2025-1866

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-1866
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-1866.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-1866
Published
2025-03-03T09:15:39Z
Modified
2025-03-04T02:01:09.495966Z
Summary
[none]
Details

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in warmcat libwebsockets allows Pointer Manipulation, potentially leading to out-of-bounds memory access. This issue affects libwebsockets before 4.3.4 and is present in code built specifically for the Win32 platform.

By default, the affected code is not executed unless one of the following conditions is met:

LWSWITHOUTEXTENSIONS (default ON) is manually set to OFF in CMake. LWSWITHHTTPSTREAMCOMPRESSION (default OFF) is manually set to ON in CMake. Despite these conditions, when triggered in affected configurations, this vulnerability may allow attackers to manipulate pointers, potentially leading to memory corruption or unexpected behavior.

References

Affected packages

Git / github.com/warmcat/libwebsockets

Affected ranges

Type
GIT
Repo
https://github.com/warmcat/libwebsockets
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

deflate-stream-support
master-test-2015-11-06-1
master-test-2015-11-19-1
support-chrome-20-firefox-12
support-protocol-v7
support-protocol-v8-chrome-15-firefox-6
valgrind-clean

release-0.*

release-0.1
release-0.2
release-0.3
release-0.4
release-0.5
release-0.6

v1.*

v1.0-chrome25-firefox17
v1.1-chrome26-firefox18
v1.2-chrome26-firefox18
v1.21-chrome26-firefox18
v1.22-chrome26-firefox18
v1.23-chrome32-firefox24
v1.3-chrome37-firefox30
v1.4-chrome43-firefox-36
v1.5-chrome47-firefox41
v1.6.0-chrome48-firefox42
v1.7.0

v2.*

v2.0.0
v2.1-pre3
v2.1.0
v2.2.0
v2.3.0
v2.4.0

v3.*

v3.0.0
v3.1.0

v4.*

v4.0.0
v4.1.0
v4.2-rc1
v4.2.0
v4.3.0