Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13601: Integer Overflow or Wraparound

0
High
VulnerabilityCVE-2025-13601cvecve-2025-13601
Published: Wed Nov 26 2025 (11/26/2025, 14:44:22 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:01:12 UTC

Technical Analysis

CVE-2025-13601 is a heap-based buffer overflow vulnerability identified in the glib library, specifically within the g_escape_uri_string() function. This function is responsible for escaping URI strings by replacing unacceptable characters with their percent-encoded equivalents. The vulnerability occurs due to an integer overflow or wraparound during the calculation of the buffer size needed to store the escaped string. When the input string contains a very large number of characters that require escaping, the length calculation can overflow, resulting in an underestimation of the buffer size. Consequently, the function allocates a buffer smaller than necessary and writes beyond its boundary when performing the escape operation. This out-of-bounds write can corrupt adjacent memory on the heap, potentially leading to arbitrary code execution, application crashes, or other integrity and availability issues. The vulnerability does not require any privileges or user interaction to exploit, but the attacker must be able to supply crafted input to the vulnerable function. The CVSS v3.1 base score is 7.7 (high), reflecting the local attack vector, low attack complexity, no privileges required, no user interaction, and high impact on integrity and availability. The affected product is Red Hat Enterprise Linux 10, which includes the vulnerable glib version. No public exploits or proof-of-concept code are currently known. The issue was published on November 26, 2025, and is assigned CVE-2025-13601. The root cause is a classic integer overflow leading to heap buffer overflow, a common and dangerous class of vulnerabilities in C-based libraries handling untrusted input.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those running Red Hat Enterprise Linux 10 or other Linux distributions using the affected glib version. Systems processing untrusted URI inputs—such as web servers, proxy servers, or applications handling network requests—are particularly vulnerable. Exploitation could allow attackers to corrupt memory, potentially leading to arbitrary code execution, denial of service, or system instability. This could compromise the integrity and availability of critical services, impacting business operations and data security. Given the lack of required privileges or user interaction, attackers with local access or the ability to send crafted inputs remotely (if the vulnerable function is exposed) could exploit this flaw. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits post-disclosure. European sectors such as finance, government, telecommunications, and critical infrastructure that rely heavily on Red Hat Enterprise Linux are at higher risk. The vulnerability could also be leveraged in supply chain attacks or lateral movement within compromised networks.

Mitigation Recommendations

Organizations should prioritize applying official patches from Red Hat as soon as they become available to address CVE-2025-13601. Until patches are deployed, administrators should audit applications and services that utilize the g_escape_uri_string() function, especially those exposed to untrusted input, and consider implementing input validation or filtering to limit the number of escapable characters in URI inputs. Employing memory protection mechanisms such as Address Space Layout Randomization (ASLR), stack canaries, and heap protection can help mitigate exploitation impact. Monitoring logs for abnormal crashes or suspicious input patterns targeting URI processing functions can aid early detection. Network segmentation and limiting local access can reduce the attack surface. Additionally, organizations should review their incident response plans to prepare for potential exploitation scenarios. Coordination with Red Hat support and subscribing to security advisories will ensure timely updates and information.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-24T12:54:51.473Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927165b55a49d3da8582be0

Added to database: 11/26/2025, 3:01:47 PM

Last enriched: 1/30/2026, 9:01:12 AM

Last updated: 2/7/2026, 12:38:18 AM

Views: 401

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats