#VU106058 Stack-based buffer overflow in corosync - CVE-2025-30472
Published: March 26, 2025
Vulnerability identifier: #VU106058
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2025-30472
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
corosync
corosync
Software vendor:
corosync
corosync
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a boundary error in orf_token_endian_convert() function in exec/totemsrp.c. A remote attacker can send an overly large UDP packet to the application, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability requires that encryption is disabled.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.