Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13601: Integer Overflow or Wraparound

0
High
VulnerabilityCVE-2025-13601cvecve-2025-13601
Published: Wed Nov 26 2025 (11/26/2025, 14:44:22 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

AI-Powered Analysis

AILast updated: 12/03/2025, 15:47:24 UTC

Technical Analysis

CVE-2025-13601 is a heap-based buffer overflow vulnerability identified in the glib library, specifically within the g_escape_uri_string() function. This function is responsible for escaping URI strings by replacing unacceptable characters with percent-encoded equivalents. The vulnerability stems from an integer overflow or wraparound during the calculation of the buffer size needed to store the escaped string. When the input string contains a very large number of characters that require escaping, the calculation of the escaped string's length can overflow the integer variable used for size determination. This overflow results in allocating a buffer smaller than necessary. Subsequently, when the function writes the escaped characters into this undersized buffer, it causes a heap-based buffer overflow by writing beyond the allocated memory boundary. This memory corruption can lead to unpredictable behavior, including potential arbitrary code execution or denial of service. The vulnerability does not require any privileges or user interaction to exploit, but it requires local access since the attack vector is local (AV:L). The CVSS 3.1 base score is 7.7, reflecting high severity due to the impact on integrity and availability. The affected product is Red Hat Enterprise Linux 10, which includes the vulnerable glib version. No public exploits are currently known, but the flaw's nature makes it a significant risk once weaponized. The issue was published on November 26, 2025, and is assigned CVE-2025-13601. The vulnerability is critical for applications relying on glib for URI escaping, especially those processing untrusted input strings with many escapable characters.

Potential Impact

For European organizations, this vulnerability poses a significant risk to systems running Red Hat Enterprise Linux 10 or other distributions incorporating the vulnerable glib version. Exploitation could lead to arbitrary code execution or denial of service, impacting the integrity and availability of critical services. This is particularly concerning for sectors such as finance, telecommunications, government, and critical infrastructure, where Linux-based servers are prevalent. The local attack vector limits remote exploitation but does not eliminate risk in environments where multiple users have local access or where attackers can execute code locally via other vulnerabilities or social engineering. The absence of required privileges or user interaction increases the threat level in multi-tenant or shared environments. Disruption or compromise of key systems could lead to data loss, service outages, or lateral movement within networks. Given the widespread use of Red Hat Enterprise Linux in European enterprises and public sector organizations, the vulnerability could have broad operational and security impacts if left unmitigated.

Mitigation Recommendations

1. Apply official patches or updates from Red Hat as soon as they become available to address the vulnerability in glib. 2. In the interim, audit applications and services that utilize the g_escape_uri_string() function to identify potential exposure, especially those processing untrusted or user-supplied input. 3. Employ runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR), stack canaries, and heap protections to mitigate exploitation risk. 4. Use static and dynamic analysis tools to detect unsafe usage patterns of URI escaping functions in custom or third-party code. 5. Restrict local access to critical systems to trusted users only, minimizing the risk of local exploitation. 6. Monitor system logs and behavior for signs of memory corruption or anomalous crashes that could indicate exploitation attempts. 7. Consider deploying intrusion detection systems capable of identifying heap overflow exploitation techniques. 8. Educate system administrators and developers about the vulnerability and encourage secure coding practices to avoid similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-24T12:54:51.473Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927165b55a49d3da8582be0

Added to database: 11/26/2025, 3:01:47 PM

Last enriched: 12/3/2025, 3:47:24 PM

Last updated: 1/11/2026, 12:08:30 AM

Views: 323

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats