Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11964: CWE-787 Out-of-bounds Write in The Tcpdump Group libpcap

0
Low
VulnerabilityCVE-2025-11964cvecve-2025-11964cwe-787
Published: Wed Dec 31 2025 (12/31/2025, 00:58:19 UTC)
Source: CVE Database V5
Vendor/Project: The Tcpdump Group
Product: libpcap

Description

On Windows only, if libpcap needs to convert a Windows error message to UTF-8 and the message includes characters that UTF-8 represents using 4 bytes, utf_16le_to_utf_8_truncated() can write data beyond the end of the provided buffer.

AI-Powered Analysis

AILast updated: 01/07/2026, 03:26:33 UTC

Technical Analysis

CVE-2025-11964 is an out-of-bounds write vulnerability classified under CWE-787, found in libpcap version 1.10.0 on Windows platforms. Libpcap is a widely used packet capture library integral to many network monitoring and security tools. The vulnerability arises specifically during the conversion of Windows error messages to UTF-8 encoding. When the error message contains characters that require 4 bytes in UTF-8, the function utf_16le_to_utf_8_truncated() may write beyond the end of the buffer allocated for the converted string. This buffer overflow can corrupt adjacent memory, potentially leading to data integrity issues or application instability. Exploitation requires local access with high privileges and is complex due to the need to trigger specific error messages containing 4-byte UTF-8 characters. No user interaction is necessary, and the vulnerability does not affect confidentiality or availability. No known exploits have been reported in the wild, and no patches are currently linked, indicating the need for vendor updates. The vulnerability's impact is limited to Windows environments running the affected libpcap version, primarily impacting applications that handle Windows error messages and perform packet capture or analysis.

Potential Impact

For European organizations, the impact of CVE-2025-11964 is relatively low but non-negligible. Since libpcap is embedded in many network security and monitoring tools, any integrity compromise could affect the accuracy and reliability of network data analysis, potentially leading to incorrect forensic conclusions or missed detection of malicious activity. The vulnerability requires local high-privilege access, limiting remote exploitation risks. However, insider threats or compromised administrative accounts could leverage this flaw to destabilize security monitoring tools or cause subtle data corruption. The absence of confidentiality or availability impact reduces the risk of data leaks or denial of service. Organizations relying heavily on Windows-based network analysis tools incorporating libpcap should prioritize remediation to maintain operational integrity. The lack of known exploits reduces immediate threat but does not eliminate future risk, especially as attackers may develop exploits targeting this flaw.

Mitigation Recommendations

To mitigate CVE-2025-11964, organizations should: 1) Monitor for and apply vendor patches or updates to libpcap as soon as they become available, ensuring the vulnerable function is corrected. 2) Audit and restrict local administrative privileges to minimize the risk of exploitation by unauthorized users. 3) Review and harden Windows error message handling in applications that utilize libpcap to avoid triggering the vulnerable code path. 4) Employ runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) on Windows hosts to reduce exploitation success. 5) Conduct thorough testing of network monitoring and forensic tools after updates to verify stability and correctness. 6) Maintain robust logging and monitoring to detect anomalous behavior indicative of exploitation attempts. 7) Consider isolating critical network analysis systems to limit exposure to potential insider threats. These steps go beyond generic advice by focusing on privilege management, error handling, and proactive patch management tailored to the vulnerability's characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Tcpdump
Date Reserved
2025-10-20T14:43:15.180Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69547c56db813ff03e760a65

Added to database: 12/31/2025, 1:28:54 AM

Last enriched: 1/7/2026, 3:26:33 AM

Last updated: 2/7/2026, 5:56:20 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats