Search for vulnerabilities
Vulnerability details: VCID-qub7-dgyg-vqe8
Vulnerability ID VCID-qub7-dgyg-vqe8
Aliases CVE-2025-0840
Summary A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3 5.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0840.json
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00137 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00175 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00175 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00175 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00175 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00238 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00238 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00238 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00238 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00238 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
epss 0.00238 https://api.first.org/data/v1/epss?cve=CVE-2025-0840
cvssv3.1 4.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2025-0840
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0840.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2025-0840
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.34313
EPSS Score 0.00137
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:31:19.938408+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/v3.22/main.json 37.0.0