Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13601: Integer Overflow or Wraparound

0
High
VulnerabilityCVE-2025-13601cvecve-2025-13601
Published: Wed Nov 26 2025 (11/26/2025, 14:44:22 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:00:20 UTC

Technical Analysis

CVE-2025-13601 is a vulnerability identified in the glib library, specifically within the g_escape_uri_string() function. The issue arises from an incorrect calculation of the buffer size needed to store an escaped URI string. When the input string contains a very large number of characters that require escaping, the length calculation can overflow an integer variable, causing the allocated buffer to be smaller than necessary. This leads to a heap-based buffer overflow when the function writes beyond the allocated memory boundary. The vulnerability can be triggered remotely without requiring authentication or user interaction, as it is a local vector (AV:L) but with low attack complexity (AC:L). The CVSS v3.1 score of 7.7 reflects high impact on integrity and availability, though confidentiality is not affected. The flaw affects Red Hat Enterprise Linux 10, a widely used enterprise operating system. No public exploits have been reported yet, but the nature of the vulnerability makes it a critical concern for systems processing untrusted URI input. The overflow can cause application crashes or potentially allow attackers to execute arbitrary code or corrupt memory, leading to denial of service or further compromise.

Potential Impact

The primary impact of CVE-2025-13601 is on the integrity and availability of affected systems. Exploiting this vulnerability can lead to heap corruption, which may cause application crashes or enable attackers to execute arbitrary code with the privileges of the affected process. This can result in denial of service or escalation of privileges if the vulnerable function is used in privileged contexts. Since the vulnerability exists in a core library used for URI escaping, many applications and services relying on glib could be indirectly affected, increasing the attack surface. Organizations running Red Hat Enterprise Linux 10 in critical environments, such as servers handling web requests or network services, face risks of service disruption or compromise. Although no known exploits are currently in the wild, the ease of exploitation and high impact necessitate urgent attention to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2025-13601, organizations should apply official patches from Red Hat as soon as they become available. Until patches are deployed, it is advisable to implement input validation to limit the size and content of strings passed to functions that perform URI escaping, thereby reducing the risk of triggering the overflow. Employing runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR), stack canaries, and heap protection can help detect or prevent exploitation attempts. Monitoring application logs for crashes or unusual behavior related to URI processing can aid in early detection. Additionally, restricting access to services that process untrusted input and using application-layer firewalls to filter malicious requests can reduce exposure. Developers should review and update code that uses glib’s URI escaping functions to handle large inputs safely and consider alternative libraries if immediate patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-24T12:54:51.473Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927165b55a49d3da8582be0

Added to database: 11/26/2025, 3:01:47 PM

Last enriched: 3/20/2026, 2:00:20 AM

Last updated: 3/24/2026, 7:11:54 AM

Views: 533

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses