// For flags

CVE-2025-8746

GNU libopts __strstr_sse2 memory corruption

Severity Score

4.8
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability, which was classified as problematic, was found in GNU libopts up to 27.6. Affected is the function __strstr_sse2. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. This issue was initially reported to the tcpreplay project, but the code maintainer explains, that this "bug appears to be in libopts which is an external library." This vulnerability only affects products that are no longer supported by the maintainer.

Es wurde eine Schwachstelle in GNU libopts bis 27.6 gefunden. Sie wurde als problematisch eingestuft. Es geht dabei um die Funktion __strstr_sse2. Dank der Manipulation mit unbekannten Daten kann eine memory corruption-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur öffentlichen Verfügung.

An update that fixes 11 vulnerabilities is now available. This update for tcpreplay fixes the following issues.

*Credits: nipc-cxd
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Attack Requirements
None
Privileges Required
Low
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
Low
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Local
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
Poc
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-08-08 CVE Reserved
  • 2025-08-09 CVE Published
  • 2025-08-11 CVE Updated
  • 2025-08-11 First Exploit
  • 2026-03-05 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
GNU
Search vendor "GNU"
Libopts
Search vendor "GNU" for product "Libopts"
27.0
Search vendor "GNU" for product "Libopts" and version "27.0"
en
Affected
GNU
Search vendor "GNU"
Libopts
Search vendor "GNU" for product "Libopts"
27.1
Search vendor "GNU" for product "Libopts" and version "27.1"
en
Affected
GNU
Search vendor "GNU"
Libopts
Search vendor "GNU" for product "Libopts"
27.2
Search vendor "GNU" for product "Libopts" and version "27.2"
en
Affected
GNU
Search vendor "GNU"
Libopts
Search vendor "GNU" for product "Libopts"
27.3
Search vendor "GNU" for product "Libopts" and version "27.3"
en
Affected
GNU
Search vendor "GNU"
Libopts
Search vendor "GNU" for product "Libopts"
27.4
Search vendor "GNU" for product "Libopts" and version "27.4"
en
Affected
GNU
Search vendor "GNU"
Libopts
Search vendor "GNU" for product "Libopts"
27.5
Search vendor "GNU" for product "Libopts" and version "27.5"
en
Affected
GNU
Search vendor "GNU"
Libopts
Search vendor "GNU" for product "Libopts"
27.6
Search vendor "GNU" for product "Libopts" and version "27.6"
en
Affected