CVE-2025-65411: n/a
A NULL pointer dereference in the src/path.c component of GNU Unrtf v0.21.10 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the search_path parameter.
AI Analysis
Technical Summary
CVE-2025-65411 is a vulnerability identified in GNU Unrtf version 0.21.10, specifically within the src/path.c source file. The issue is a NULL pointer dereference triggered when processing the search_path parameter. This occurs because the software fails to properly validate or handle certain crafted inputs, leading to an attempt to dereference a NULL pointer. The consequence is a Denial of Service (DoS) condition, where the application crashes or terminates unexpectedly, disrupting normal operations. The vulnerability can be exploited remotely without requiring any privileges or user interaction, making it accessible to unauthenticated attackers. The CVSS v3.1 base score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but a high impact on availability. Although no public exploits are currently known, the vulnerability represents a significant risk to systems relying on GNU Unrtf for document conversion or processing tasks. The root cause aligns with CWE-476 (NULL Pointer Dereference), a common programming error that can lead to application instability or crashes. No patches or fixes are currently linked, indicating the need for developers or users to apply custom mitigations or await official updates.
Potential Impact
For European organizations, the primary impact of CVE-2025-65411 is the potential disruption of services that depend on GNU Unrtf for converting or processing RTF documents. This could affect document management systems, automated workflows, or any backend processes that utilize Unrtf, leading to downtime or degraded service availability. Sectors such as government, finance, legal, and healthcare, which often handle large volumes of documents and may use open-source tools like Unrtf, could experience operational interruptions. Although the vulnerability does not compromise confidentiality or integrity, the denial of service could result in loss of productivity, delayed processing, and potential cascading effects on dependent systems. Additionally, if exploited in a targeted attack, it could serve as a vector for distraction or cover for other malicious activities. The lack of authentication or user interaction requirements increases the risk of widespread exploitation if the vulnerability becomes publicly known or weaponized.
Mitigation Recommendations
To mitigate CVE-2025-65411, organizations should first identify all instances of GNU Unrtf in their environments, especially version 0.21.10. Since no official patches are currently available, users should consider the following specific actions: (1) Implement input validation and sanitization on the search_path parameter before it reaches Unrtf, blocking or filtering suspicious payloads that could trigger NULL dereferences. (2) Employ application-level sandboxing or containerization to isolate Unrtf processes, limiting the impact of crashes on broader systems. (3) Monitor logs and system behavior for abnormal terminations or crashes related to Unrtf usage to detect exploitation attempts early. (4) Engage with the GNU Unrtf development community to track patch releases or contribute fixes addressing the NULL pointer dereference. (5) Where feasible, replace or supplement Unrtf with alternative, actively maintained document conversion tools that do not exhibit this vulnerability. (6) Incorporate network-level protections such as web application firewalls (WAFs) to detect and block crafted payloads targeting this vulnerability. These measures go beyond generic advice by focusing on proactive input handling, isolation, monitoring, and community engagement.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-65411: n/a
Description
A NULL pointer dereference in the src/path.c component of GNU Unrtf v0.21.10 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the search_path parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-65411 is a vulnerability identified in GNU Unrtf version 0.21.10, specifically within the src/path.c source file. The issue is a NULL pointer dereference triggered when processing the search_path parameter. This occurs because the software fails to properly validate or handle certain crafted inputs, leading to an attempt to dereference a NULL pointer. The consequence is a Denial of Service (DoS) condition, where the application crashes or terminates unexpectedly, disrupting normal operations. The vulnerability can be exploited remotely without requiring any privileges or user interaction, making it accessible to unauthenticated attackers. The CVSS v3.1 base score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but a high impact on availability. Although no public exploits are currently known, the vulnerability represents a significant risk to systems relying on GNU Unrtf for document conversion or processing tasks. The root cause aligns with CWE-476 (NULL Pointer Dereference), a common programming error that can lead to application instability or crashes. No patches or fixes are currently linked, indicating the need for developers or users to apply custom mitigations or await official updates.
Potential Impact
For European organizations, the primary impact of CVE-2025-65411 is the potential disruption of services that depend on GNU Unrtf for converting or processing RTF documents. This could affect document management systems, automated workflows, or any backend processes that utilize Unrtf, leading to downtime or degraded service availability. Sectors such as government, finance, legal, and healthcare, which often handle large volumes of documents and may use open-source tools like Unrtf, could experience operational interruptions. Although the vulnerability does not compromise confidentiality or integrity, the denial of service could result in loss of productivity, delayed processing, and potential cascading effects on dependent systems. Additionally, if exploited in a targeted attack, it could serve as a vector for distraction or cover for other malicious activities. The lack of authentication or user interaction requirements increases the risk of widespread exploitation if the vulnerability becomes publicly known or weaponized.
Mitigation Recommendations
To mitigate CVE-2025-65411, organizations should first identify all instances of GNU Unrtf in their environments, especially version 0.21.10. Since no official patches are currently available, users should consider the following specific actions: (1) Implement input validation and sanitization on the search_path parameter before it reaches Unrtf, blocking or filtering suspicious payloads that could trigger NULL dereferences. (2) Employ application-level sandboxing or containerization to isolate Unrtf processes, limiting the impact of crashes on broader systems. (3) Monitor logs and system behavior for abnormal terminations or crashes related to Unrtf usage to detect exploitation attempts early. (4) Engage with the GNU Unrtf development community to track patch releases or contribute fixes addressing the NULL pointer dereference. (5) Where feasible, replace or supplement Unrtf with alternative, actively maintained document conversion tools that do not exhibit this vulnerability. (6) Incorporate network-level protections such as web application firewalls (WAFs) to detect and block crafted payloads targeting this vulnerability. These measures go beyond generic advice by focusing on proactive input handling, isolation, monitoring, and community engagement.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695450a4db813ff03e2be149
Added to database: 12/30/2025, 10:22:28 PM
Last enriched: 1/7/2026, 12:09:16 AM
Last updated: 2/21/2026, 2:17:27 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.