CVE-2025-34468

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-34468
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-34468.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-34468
Downstream
Published
2025-12-31T19:15:43.923Z
Modified
2026-01-03T05:44:47.321906Z
Severity
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).

References

Affected packages

Git / github.com/obgm/libcoap

Affected ranges

Type
GIT
Repo
https://github.com/obgm/libcoap
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

bsd-licensed
coap-lwip
coap-tinydtls
v4_1_1

v4.*

v4.1.1
v4.1.2
v4.2.0
v4.2.0-rc1
v4.2.0-rc2
v4.2.0-rc3
v4.2.0-rc4
v4.2.1
v4.3.0
v4.3.0-rc1
v4.3.0-rc2
v4.3.0-rc3
v4.3.0-rc4
v4.3.1
v4.3.1-rc1
v4.3.1-rc2
v4.3.2
v4.3.2-rc1
v4.3.2-rc2
v4.3.3
v4.3.4
v4.3.5
v4.3.5-rc1
v4.3.5-rc2
v4.3.5-rc3

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-34468.json"