CVE-2025-8746
GNU libopts __strstr_sse2 memory corruption
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability, which was classified as problematic, was found in GNU libopts up to 27.6. Affected is the function __strstr_sse2. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. This issue was initially reported to the tcpreplay project, but the code maintainer explains, that this "bug appears to be in libopts which is an external library." This vulnerability only affects products that are no longer supported by the maintainer.
Es wurde eine Schwachstelle in GNU libopts bis 27.6 gefunden. Sie wurde als problematisch eingestuft. Es geht dabei um die Funktion __strstr_sse2. Dank der Manipulation mit unbekannten Daten kann eine memory corruption-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur öffentlichen Verfügung.
An update that fixes 11 vulnerabilities is now available. This update for tcpreplay fixes the following issues.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2025-08-08 CVE Reserved
- 2025-08-09 CVE Published
- 2025-08-11 CVE Updated
- 2025-08-11 First Exploit
- 2026-03-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
| URL | Tag | Source |
|---|---|---|
| https://github.com/appneta/tcpreplay/issues/957 | Issue Tracking | |
| https://github.com/appneta/tcpreplay/issues/957#issuecomment-3124774393 | Issue Tracking | |
| https://vuldb.com/?id.319242 | Technical Description | |
| https://vuldb.com/?submit.623632 | Third Party Advisory | |
| https://www.gnu.org | Product |
| URL | Date | SRC |
|---|---|---|
| https://drive.google.com/file/d/1yjKOHxvL_9xExy4QUb5x43dxci1x59ts/view?usp=sharing | 2025-08-11 |
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| GNU Search vendor "GNU" | Libopts Search vendor "GNU" for product "Libopts" | 27.0 Search vendor "GNU" for product "Libopts" and version "27.0" | en |
Affected
| ||||||
| GNU Search vendor "GNU" | Libopts Search vendor "GNU" for product "Libopts" | 27.1 Search vendor "GNU" for product "Libopts" and version "27.1" | en |
Affected
| ||||||
| GNU Search vendor "GNU" | Libopts Search vendor "GNU" for product "Libopts" | 27.2 Search vendor "GNU" for product "Libopts" and version "27.2" | en |
Affected
| ||||||
| GNU Search vendor "GNU" | Libopts Search vendor "GNU" for product "Libopts" | 27.3 Search vendor "GNU" for product "Libopts" and version "27.3" | en |
Affected
| ||||||
| GNU Search vendor "GNU" | Libopts Search vendor "GNU" for product "Libopts" | 27.4 Search vendor "GNU" for product "Libopts" and version "27.4" | en |
Affected
| ||||||
| GNU Search vendor "GNU" | Libopts Search vendor "GNU" for product "Libopts" | 27.5 Search vendor "GNU" for product "Libopts" and version "27.5" | en |
Affected
| ||||||
| GNU Search vendor "GNU" | Libopts Search vendor "GNU" for product "Libopts" | 27.6 Search vendor "GNU" for product "Libopts" and version "27.6" | en |
Affected
| ||||||
