| Name | CVE-2025-55763 |
| Description | Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1112507 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| civetweb (PTS) | bullseye | 1.13+dfsg-5 | vulnerable |
| bookworm | 1.15+dfsg-4 | vulnerable | |
| trixie | 1.16+dfsg-2 | vulnerable | |
| sid, forky | 1.16+dfsg-3 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| civetweb | source | (unstable) | 1.16+dfsg-3 | 1112507 |
[trixie] - civetweb <no-dsa> (Minor issue)
[bookworm] - civetweb <no-dsa> (Minor issue)
[bullseye] - civetweb <postponed> (Minor issue)
https://github.com/krispybyte/CVE-2025-55763
https://github.com/civetweb/civetweb/pull/1347
https://github.com/civetweb/civetweb/issues/1348
Fixed by: https://github.com/civetweb/civetweb/commit/76e222bcb77ba8452e5da4e82ae6cecd499c25e0
Fixed by: https://github.com/civetweb/civetweb/commit/d5321963b1d0bc953101de91f8588bf83db73bf5