CVE-2025-68114Classic Buffer Overflow in Capstone

Severity
9.8CRITICALNVD
EPSS
0.1%
top 83.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 17

Description

Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, an unchecked vsnprintf return in SStream_concat lets a malicious cs_opt_mem.vsnprintf drive SStream’s index negative or past the end, leading to a stack buffer underflow/overflow when the next write occurs. Commit 2c7797182a1618be12017d7d41e0b6581d5d529e fixes the issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages10 packages

debiandebian/capstone< capstone 5.0.7-1 (forky)
Debiancapstone-engine/capstone< 5.0.7-1~deb13u1+1
CVEListV5capstone-engine/capstone6.0.0-Alpha5

Patches

🔴Vulnerability Details

1
OSV
CVE-2025-68114: Capstone is a disassembly framework2025-12-17

📋Vendor Advisories

3
Red Hat
capstone: Capstone: Memory corruption via unchecked vsnprintf return2025-12-17
Microsoft
Capstone doesn't check vsnprintf return in SStream_concat, allows stack buffer underflow and overflow2025-12-09
Debian
CVE-2025-68114: capstone - Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, an unch...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-68114 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2025-68114 capstone: Capstone: Memory corruption via unchecked vsnprintf return2025-12-17