CVE-2025-6196: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 7
A flaw was found in libgepub, a library used to read EPUB files. The software mishandles file size calculations when opening specially crafted EPUB files, leading to incorrect memory allocations. This issue causes the application to crash. Known affected usage includes desktop services like Tumbler, which may process malicious files automatically when browsing directories. While no direct remote attack vectors are confirmed, any application using libgepub to parse user-supplied EPUB content could be vulnerable to a denial of service.
AI Analysis
Technical Summary
CVE-2025-6196 is a medium-severity vulnerability identified in libgepub, a library utilized for reading EPUB files, present in Red Hat Enterprise Linux 7. The flaw arises from improper handling of file size calculations when processing specially crafted EPUB files, resulting in integer overflow or wraparound conditions. This miscalculation leads to incorrect memory allocation sizes, which can cause the consuming application to crash, effectively resulting in a denial of service (DoS). One known affected component is Tumbler, a desktop service that automatically processes files in directories, including EPUB files. Since Tumbler may parse malicious EPUB files without explicit user initiation, this increases the risk of triggering the vulnerability inadvertently. Although no direct remote exploitation vectors have been confirmed, any application that uses libgepub to parse user-supplied EPUB content could be vulnerable to DoS attacks if an attacker can supply malicious EPUB files. The vulnerability does not impact confidentiality or integrity but affects availability by causing application crashes. Exploitation requires local access or user interaction to open or browse directories containing malicious EPUB files. The CVSS 3.1 base score is 5.5, reflecting a medium severity with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and impact limited to availability (A:H). No known exploits are currently in the wild, and no patches or mitigations have been explicitly linked in the provided data.
Potential Impact
For European organizations, especially those using Red Hat Enterprise Linux 7 in desktop environments or servers that process EPUB files via libgepub, this vulnerability poses a risk of denial of service. The impact is primarily on availability, potentially disrupting user workflows or automated services that rely on EPUB file processing. Organizations with automated file indexing or preview services (like Tumbler) may experience crashes or service interruptions if malicious EPUB files are introduced, either inadvertently or through targeted attacks. While the vulnerability does not allow for data theft or system compromise, repeated or large-scale exploitation could degrade service reliability and user productivity. Sectors with high reliance on document processing, digital libraries, or content management systems that handle EPUB files should be particularly cautious. The lack of remote exploitation vectors reduces the risk from external attackers but does not eliminate the threat from insider threats or phishing campaigns that could deliver malicious EPUB files to users.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Update libgepub and related packages as soon as official patches or updates from Red Hat become available, ensuring the integer overflow issue is resolved. 2) Temporarily disable or restrict automatic processing of EPUB files by services like Tumbler, especially in environments where users frequently browse directories containing untrusted files. 3) Implement file validation and filtering at the gateway or endpoint level to detect and quarantine suspicious EPUB files before they reach vulnerable applications. 4) Educate users about the risks of opening EPUB files from untrusted sources and encourage cautious handling of email attachments or downloads. 5) Monitor application logs and system behavior for crashes or anomalies related to EPUB file processing to detect potential exploitation attempts early. 6) Consider sandboxing or isolating applications that parse EPUB files to contain potential crashes and prevent broader system impact. These steps go beyond generic advice by focusing on controlling the specific attack vector (malicious EPUB files) and limiting automatic processing that could trigger the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2025-6196: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 7
Description
A flaw was found in libgepub, a library used to read EPUB files. The software mishandles file size calculations when opening specially crafted EPUB files, leading to incorrect memory allocations. This issue causes the application to crash. Known affected usage includes desktop services like Tumbler, which may process malicious files automatically when browsing directories. While no direct remote attack vectors are confirmed, any application using libgepub to parse user-supplied EPUB content could be vulnerable to a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-6196 is a medium-severity vulnerability identified in libgepub, a library utilized for reading EPUB files, present in Red Hat Enterprise Linux 7. The flaw arises from improper handling of file size calculations when processing specially crafted EPUB files, resulting in integer overflow or wraparound conditions. This miscalculation leads to incorrect memory allocation sizes, which can cause the consuming application to crash, effectively resulting in a denial of service (DoS). One known affected component is Tumbler, a desktop service that automatically processes files in directories, including EPUB files. Since Tumbler may parse malicious EPUB files without explicit user initiation, this increases the risk of triggering the vulnerability inadvertently. Although no direct remote exploitation vectors have been confirmed, any application that uses libgepub to parse user-supplied EPUB content could be vulnerable to DoS attacks if an attacker can supply malicious EPUB files. The vulnerability does not impact confidentiality or integrity but affects availability by causing application crashes. Exploitation requires local access or user interaction to open or browse directories containing malicious EPUB files. The CVSS 3.1 base score is 5.5, reflecting a medium severity with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and impact limited to availability (A:H). No known exploits are currently in the wild, and no patches or mitigations have been explicitly linked in the provided data.
Potential Impact
For European organizations, especially those using Red Hat Enterprise Linux 7 in desktop environments or servers that process EPUB files via libgepub, this vulnerability poses a risk of denial of service. The impact is primarily on availability, potentially disrupting user workflows or automated services that rely on EPUB file processing. Organizations with automated file indexing or preview services (like Tumbler) may experience crashes or service interruptions if malicious EPUB files are introduced, either inadvertently or through targeted attacks. While the vulnerability does not allow for data theft or system compromise, repeated or large-scale exploitation could degrade service reliability and user productivity. Sectors with high reliance on document processing, digital libraries, or content management systems that handle EPUB files should be particularly cautious. The lack of remote exploitation vectors reduces the risk from external attackers but does not eliminate the threat from insider threats or phishing campaigns that could deliver malicious EPUB files to users.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Update libgepub and related packages as soon as official patches or updates from Red Hat become available, ensuring the integer overflow issue is resolved. 2) Temporarily disable or restrict automatic processing of EPUB files by services like Tumbler, especially in environments where users frequently browse directories containing untrusted files. 3) Implement file validation and filtering at the gateway or endpoint level to detect and quarantine suspicious EPUB files before they reach vulnerable applications. 4) Educate users about the risks of opening EPUB files from untrusted sources and encourage cautious handling of email attachments or downloads. 5) Monitor application logs and system behavior for crashes or anomalies related to EPUB file processing to detect potential exploitation attempts early. 6) Consider sandboxing or isolating applications that parse EPUB files to contain potential crashes and prevent broader system impact. These steps go beyond generic advice by focusing on controlling the specific attack vector (malicious EPUB files) and limiting automatic processing that could trigger the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-06-17T06:50:22.606Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68517cf5a8c921274385d339
Added to database: 6/17/2025, 2:34:29 PM
Last enriched: 6/17/2025, 2:49:49 PM
Last updated: 8/15/2025, 4:28:07 PM
Views: 12
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.