Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65411: n/a

0
High
VulnerabilityCVE-2025-65411cvecve-2025-65411
Published: Tue Dec 30 2025 (12/30/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A NULL pointer dereference in the src/path.c component of GNU Unrtf v0.21.10 allows attackers to cause a Denial of Service (DoS) via injecting a crafted payload into the search_path parameter.

AI-Powered Analysis

AILast updated: 01/07/2026, 00:09:16 UTC

Technical Analysis

CVE-2025-65411 is a vulnerability identified in GNU Unrtf version 0.21.10, specifically within the src/path.c source file. The issue is a NULL pointer dereference triggered when processing the search_path parameter. This occurs because the software fails to properly validate or handle certain crafted inputs, leading to an attempt to dereference a NULL pointer. The consequence is a Denial of Service (DoS) condition, where the application crashes or terminates unexpectedly, disrupting normal operations. The vulnerability can be exploited remotely without requiring any privileges or user interaction, making it accessible to unauthenticated attackers. The CVSS v3.1 base score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but a high impact on availability. Although no public exploits are currently known, the vulnerability represents a significant risk to systems relying on GNU Unrtf for document conversion or processing tasks. The root cause aligns with CWE-476 (NULL Pointer Dereference), a common programming error that can lead to application instability or crashes. No patches or fixes are currently linked, indicating the need for developers or users to apply custom mitigations or await official updates.

Potential Impact

For European organizations, the primary impact of CVE-2025-65411 is the potential disruption of services that depend on GNU Unrtf for converting or processing RTF documents. This could affect document management systems, automated workflows, or any backend processes that utilize Unrtf, leading to downtime or degraded service availability. Sectors such as government, finance, legal, and healthcare, which often handle large volumes of documents and may use open-source tools like Unrtf, could experience operational interruptions. Although the vulnerability does not compromise confidentiality or integrity, the denial of service could result in loss of productivity, delayed processing, and potential cascading effects on dependent systems. Additionally, if exploited in a targeted attack, it could serve as a vector for distraction or cover for other malicious activities. The lack of authentication or user interaction requirements increases the risk of widespread exploitation if the vulnerability becomes publicly known or weaponized.

Mitigation Recommendations

To mitigate CVE-2025-65411, organizations should first identify all instances of GNU Unrtf in their environments, especially version 0.21.10. Since no official patches are currently available, users should consider the following specific actions: (1) Implement input validation and sanitization on the search_path parameter before it reaches Unrtf, blocking or filtering suspicious payloads that could trigger NULL dereferences. (2) Employ application-level sandboxing or containerization to isolate Unrtf processes, limiting the impact of crashes on broader systems. (3) Monitor logs and system behavior for abnormal terminations or crashes related to Unrtf usage to detect exploitation attempts early. (4) Engage with the GNU Unrtf development community to track patch releases or contribute fixes addressing the NULL pointer dereference. (5) Where feasible, replace or supplement Unrtf with alternative, actively maintained document conversion tools that do not exhibit this vulnerability. (6) Incorporate network-level protections such as web application firewalls (WAFs) to detect and block crafted payloads targeting this vulnerability. These measures go beyond generic advice by focusing on proactive input handling, isolation, monitoring, and community engagement.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695450a4db813ff03e2be149

Added to database: 12/30/2025, 10:22:28 PM

Last enriched: 1/7/2026, 12:09:16 AM

Last updated: 2/21/2026, 2:17:27 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats