CVE-2025-67873: CWE-122: Heap-based Buffer Overflow in capstone-engine capstone
Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, Skipdata length is not bounds-checked, so a user-provided skipdata callback can make cs_disasm/cs_disasm_iter memcpy more than 24 bytes into cs_insn.bytes, causing a heap buffer overflow in the disassembly path. Commit cbef767ab33b82166d263895f24084b75b316df3 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-67873 is a heap-based buffer overflow vulnerability identified in the capstone disassembly framework, specifically affecting versions 6.0.0-Alpha5 and earlier. Capstone is widely used for binary disassembly in security research, malware analysis, and reverse engineering. The vulnerability stems from improper bounds checking of the skipdata length parameter within the skipdata callback function. When a user-supplied skipdata callback is invoked, the cs_disasm or cs_disasm_iter functions perform a memcpy operation that can copy more than 24 bytes into the cs_insn.bytes buffer without verifying the buffer size, leading to heap memory corruption. This memory corruption can potentially be exploited to execute arbitrary code, cause application crashes, or leak sensitive information. The vulnerability requires local access with low privileges and some user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R). The vulnerability has a CVSS score of 4.8, categorized as medium severity. Although no known exploits are currently reported in the wild, the issue is critical for environments relying on capstone for security tooling. The vulnerability was fixed in a commit identified as cbef767ab33b82166d263895f24084b75b316df3, which implements proper bounds checking on the skipdata length parameter to prevent buffer overflow. Organizations using affected versions should upgrade to patched versions promptly to mitigate risks.
Potential Impact
The heap-based buffer overflow vulnerability in capstone can lead to memory corruption, which may be leveraged to execute arbitrary code, cause denial of service through application crashes, or leak sensitive information processed during disassembly. For European organizations, especially those involved in cybersecurity research, malware analysis, and software development, this vulnerability poses a risk to the integrity and availability of their analysis tools. If exploited, attackers could compromise the security of systems performing binary analysis, potentially undermining incident response and threat hunting capabilities. Although exploitation requires local access and user interaction, insider threats or compromised user accounts could trigger the vulnerability. The medium CVSS score reflects moderate risk, but the strategic importance of affected tools in security operations elevates the potential impact. Additionally, compromised analysis tools could lead to incorrect threat assessments or delayed responses, indirectly affecting organizational security posture.
Mitigation Recommendations
European organizations should immediately identify and inventory all instances of capstone-engine usage within their environments, including security tools, malware analysis platforms, and development environments. They should upgrade to the fixed version of capstone that includes the patch from commit cbef767ab33b82166d263895f24084b75b316df3 or later. If upgrading is not immediately feasible, organizations should implement strict access controls to limit local user privileges and restrict execution of untrusted skipdata callbacks. Employ application whitelisting and sandboxing techniques to isolate disassembly processes and prevent exploitation from user-supplied inputs. Regularly monitor logs for abnormal crashes or memory errors in tools using capstone, which could indicate attempted exploitation. Incorporate vulnerability scanning and software composition analysis in the software development lifecycle to detect vulnerable capstone versions. Finally, educate users and administrators about the risks of executing untrusted code or callbacks within analysis tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-67873: CWE-122: Heap-based Buffer Overflow in capstone-engine capstone
Description
Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, Skipdata length is not bounds-checked, so a user-provided skipdata callback can make cs_disasm/cs_disasm_iter memcpy more than 24 bytes into cs_insn.bytes, causing a heap buffer overflow in the disassembly path. Commit cbef767ab33b82166d263895f24084b75b316df3 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-67873 is a heap-based buffer overflow vulnerability identified in the capstone disassembly framework, specifically affecting versions 6.0.0-Alpha5 and earlier. Capstone is widely used for binary disassembly in security research, malware analysis, and reverse engineering. The vulnerability stems from improper bounds checking of the skipdata length parameter within the skipdata callback function. When a user-supplied skipdata callback is invoked, the cs_disasm or cs_disasm_iter functions perform a memcpy operation that can copy more than 24 bytes into the cs_insn.bytes buffer without verifying the buffer size, leading to heap memory corruption. This memory corruption can potentially be exploited to execute arbitrary code, cause application crashes, or leak sensitive information. The vulnerability requires local access with low privileges and some user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R). The vulnerability has a CVSS score of 4.8, categorized as medium severity. Although no known exploits are currently reported in the wild, the issue is critical for environments relying on capstone for security tooling. The vulnerability was fixed in a commit identified as cbef767ab33b82166d263895f24084b75b316df3, which implements proper bounds checking on the skipdata length parameter to prevent buffer overflow. Organizations using affected versions should upgrade to patched versions promptly to mitigate risks.
Potential Impact
The heap-based buffer overflow vulnerability in capstone can lead to memory corruption, which may be leveraged to execute arbitrary code, cause denial of service through application crashes, or leak sensitive information processed during disassembly. For European organizations, especially those involved in cybersecurity research, malware analysis, and software development, this vulnerability poses a risk to the integrity and availability of their analysis tools. If exploited, attackers could compromise the security of systems performing binary analysis, potentially undermining incident response and threat hunting capabilities. Although exploitation requires local access and user interaction, insider threats or compromised user accounts could trigger the vulnerability. The medium CVSS score reflects moderate risk, but the strategic importance of affected tools in security operations elevates the potential impact. Additionally, compromised analysis tools could lead to incorrect threat assessments or delayed responses, indirectly affecting organizational security posture.
Mitigation Recommendations
European organizations should immediately identify and inventory all instances of capstone-engine usage within their environments, including security tools, malware analysis platforms, and development environments. They should upgrade to the fixed version of capstone that includes the patch from commit cbef767ab33b82166d263895f24084b75b316df3 or later. If upgrading is not immediately feasible, organizations should implement strict access controls to limit local user privileges and restrict execution of untrusted skipdata callbacks. Employ application whitelisting and sandboxing techniques to isolate disassembly processes and prevent exploitation from user-supplied inputs. Regularly monitor logs for abnormal crashes or memory errors in tools using capstone, which could indicate attempted exploitation. Incorporate vulnerability scanning and software composition analysis in the software development lifecycle to detect vulnerable capstone versions. Finally, educate users and administrators about the risks of executing untrusted code or callbacks within analysis tools.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-12T18:53:03.237Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69431f35fab815a9fc1ded1d
Added to database: 12/17/2025, 9:23:01 PM
Last enriched: 12/17/2025, 9:37:45 PM
Last updated: 12/18/2025, 2:57:10 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.