Skip to main content

CVE-2025-47268: CWE-190 Integer Overflow or Wraparound in iputils iputils

Medium
VulnerabilityCVE-2025-47268cvecve-2025-47268cwe-190
Published: Mon May 05 2025 (05/05/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: iputils
Product: iputils

Description

ping in iputils through 20240905 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication.

AI-Powered Analysis

AILast updated: 07/06/2025, 19:56:20 UTC

Technical Analysis

CVE-2025-47268 is a medium-severity vulnerability affecting the iputils package, specifically the ping utility, through version 20240905. The issue arises from a signed 64-bit integer overflow during timestamp multiplication when processing ICMP Echo Reply packets. This vulnerability is categorized under CWE-190 (Integer Overflow or Wraparound). When a specially crafted ICMP Echo Reply packet is received, the ping utility performs a multiplication operation on a timestamp value that can overflow the signed 64-bit integer range. This overflow leads to incorrect calculations, which in turn cause the application to either crash or behave incorrectly, resulting in a denial of service (DoS). The vulnerability does not require any privileges or user interaction to be exploited and can be triggered remotely by sending malicious ICMP Echo Reply packets to a vulnerable system running the affected ping utility. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and low availability impact. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability affects all versions up to 20240905, indicating that users of iputils should be vigilant for updates.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network diagnostic and monitoring infrastructure that relies on the iputils ping utility. Since ping is a common tool used for network troubleshooting and monitoring, exploitation could disrupt network operations by causing denial of service on affected hosts. This could lead to temporary loss of network visibility or monitoring capabilities, impacting incident response and network management. While the vulnerability does not allow for code execution or data exfiltration, the denial of service could be leveraged as part of a broader attack to degrade network reliability or mask other malicious activities. Organizations with automated network monitoring systems that rely on ping responses may experience false negatives or system crashes, potentially delaying detection of other threats. The impact is more significant in environments where uptime and continuous monitoring are critical, such as financial institutions, telecommunications providers, and critical infrastructure sectors prevalent in Europe.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Monitor for updates from the iputils project and apply patches promptly once available. 2) Implement network-level filtering to restrict or monitor ICMP Echo Reply packets from untrusted sources, reducing exposure to crafted malicious packets. 3) Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous ICMP traffic patterns indicative of exploitation attempts. 4) Use alternative or updated network diagnostic tools that are not vulnerable or have been patched. 5) Conduct regular vulnerability assessments and penetration testing focusing on network utilities and their handling of ICMP traffic. 6) Harden network segmentation to limit the exposure of critical systems to external ICMP traffic. 7) Educate network administrators about the risks of ICMP-based attacks and encourage cautious use of ping in automated scripts or monitoring tools until the vulnerability is resolved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbdacf2

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/6/2025, 7:56:20 PM

Last updated: 8/8/2025, 1:31:38 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats