CVE-2025-54487

Source
https://cve.org/CVERecord?id=CVE-2025-54487
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54487.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-54487
Downstream
Published
2025-08-25T14:15:34.860Z
Modified
2026-04-10T05:29:35.687756Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 8842 of biosig.c on the current master branch (35a819fa), when the Tag is 12:

            else if (tag==12)    //0x0C
            {
                // sampling resolution
                if (len>6) fprintf(stderr,"Warning MFER tag12 incorrect length %i>6\n",len);
                val32   = 0;
                int8_t  v8;
                curPos += ifread(&UnitCode,1,1,hdr);
                curPos += ifread(&v8,1,1,hdr);
                curPos += ifread(buf,1,len-2,hdr);

In addition to values of len greater than 130 triggering a buffer overflow, a value of len smaller than 2 will also trigger a buffer overflow due to an integer underflow when computing len-2 in this code path.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54487.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "3.9.1"
            }
        ]
    }
]