CVE-2025-34468

Source
https://cve.org/CVERecord?id=CVE-2025-34468
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-34468.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-34468
Downstream
Published
2025-12-31T19:15:43.923Z
Modified
2026-03-12T20:21:21.460816Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).

References

Affected packages

Git / github.com/obgm/libcoap

Affected ranges

Type
GIT
Repo
https://github.com/obgm/libcoap
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "4.3.5"
        }
    ]
}

Affected versions

Other
bsd-licensed
coap-lwip
coap-tinydtls
v4_1_1
v4.*
v4.1.1
v4.1.2
v4.2.0
v4.2.0-rc1
v4.2.0-rc2
v4.2.0-rc3
v4.2.0-rc4
v4.2.1
v4.3.0
v4.3.0-rc1
v4.3.0-rc2
v4.3.0-rc3
v4.3.0-rc4
v4.3.1
v4.3.1-rc1
v4.3.1-rc2
v4.3.2
v4.3.2-rc1
v4.3.2-rc2
v4.3.3
v4.3.4
v4.3.5
v4.3.5-rc1
v4.3.5-rc2
v4.3.5-rc3
v4.3.5a

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-34468.json"