CVE-2025-67873: CWE-122: Heap-based Buffer Overflow in capstone-engine capstone
Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, Skipdata length is not bounds-checked, so a user-provided skipdata callback can make cs_disasm/cs_disasm_iter memcpy more than 24 bytes into cs_insn.bytes, causing a heap buffer overflow in the disassembly path. Commit cbef767ab33b82166d263895f24084b75b316df3 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-67873 is a heap-based buffer overflow vulnerability identified in the capstone disassembly framework, specifically affecting versions 6.0.0-Alpha5 and earlier. Capstone is widely used for binary disassembly in security research, malware analysis, and reverse engineering. The vulnerability stems from improper bounds checking of the skipdata length parameter within the skipdata callback function. When a user-supplied skipdata callback is invoked during disassembly via cs_disasm or cs_disasm_iter, the memcpy operation can copy more than 24 bytes into the cs_insn.bytes buffer, exceeding its allocated heap space. This overflow can corrupt adjacent heap memory, potentially leading to arbitrary code execution, denial of service, or information disclosure depending on the context of use. Exploitation requires local access with low privileges and some user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R). The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow). Although no known exploits are currently reported in the wild, the flaw poses a risk to environments where capstone is integrated into security tools or automated analysis pipelines. The issue was addressed in a commit identified as cbef767ab33b82166d263895f24084b75b316df3, which implements proper bounds checking to prevent overflow. Organizations using vulnerable versions should apply this fix or upgrade to a secure release. Due to the nature of the vulnerability, attackers with local access could leverage it to compromise system integrity or cause crashes, impacting the reliability of security analysis workflows.
Potential Impact
For European organizations, the impact of CVE-2025-67873 depends largely on the deployment of capstone within their security infrastructure. Organizations involved in cybersecurity research, malware analysis, reverse engineering, or software development that utilize capstone could face risks of system crashes, data corruption, or potential privilege escalation if the vulnerability is exploited. The heap overflow could allow attackers to execute arbitrary code or disrupt disassembly processes, undermining the integrity and availability of critical analysis tools. This may lead to delays in threat detection or forensic investigations. Although exploitation requires local access and user interaction, insider threats or compromised user accounts could facilitate attacks. The confidentiality of sensitive analysis data might also be at risk if memory corruption leads to information leakage. Given the medium CVSS score and the requirement for local access, the threat is moderate but should not be underestimated in high-security environments. Failure to patch could expose organizations to targeted attacks aiming to disable or manipulate security tooling, which is particularly concerning for critical infrastructure operators and government agencies in Europe.
Mitigation Recommendations
1. Upgrade capstone to a version later than 6.0.0-Alpha5 that includes the fix from commit cbef767ab33b82166d263895f24084b75b316df3. 2. If upgrading is not immediately possible, apply the patch manually to enforce bounds checking on skipdata length in the skipdata callback. 3. Restrict local access to systems running capstone-based tools to trusted users only, minimizing the risk of exploitation by unprivileged users. 4. Implement strict user account controls and monitor for unusual user activity that might indicate attempts to exploit the vulnerability. 5. Employ application whitelisting and integrity monitoring on security analysis tools to detect unauthorized modifications or crashes. 6. Conduct regular security audits of software dependencies, especially those used in critical analysis workflows, to ensure timely patching of vulnerabilities. 7. Educate security analysts and developers about the risks of using vulnerable versions and encourage best practices in handling third-party libraries. 8. Consider sandboxing or isolating disassembly processes to limit the impact of potential memory corruption.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-67873: CWE-122: Heap-based Buffer Overflow in capstone-engine capstone
Description
Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, Skipdata length is not bounds-checked, so a user-provided skipdata callback can make cs_disasm/cs_disasm_iter memcpy more than 24 bytes into cs_insn.bytes, causing a heap buffer overflow in the disassembly path. Commit cbef767ab33b82166d263895f24084b75b316df3 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-67873 is a heap-based buffer overflow vulnerability identified in the capstone disassembly framework, specifically affecting versions 6.0.0-Alpha5 and earlier. Capstone is widely used for binary disassembly in security research, malware analysis, and reverse engineering. The vulnerability stems from improper bounds checking of the skipdata length parameter within the skipdata callback function. When a user-supplied skipdata callback is invoked during disassembly via cs_disasm or cs_disasm_iter, the memcpy operation can copy more than 24 bytes into the cs_insn.bytes buffer, exceeding its allocated heap space. This overflow can corrupt adjacent heap memory, potentially leading to arbitrary code execution, denial of service, or information disclosure depending on the context of use. Exploitation requires local access with low privileges and some user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R). The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow). Although no known exploits are currently reported in the wild, the flaw poses a risk to environments where capstone is integrated into security tools or automated analysis pipelines. The issue was addressed in a commit identified as cbef767ab33b82166d263895f24084b75b316df3, which implements proper bounds checking to prevent overflow. Organizations using vulnerable versions should apply this fix or upgrade to a secure release. Due to the nature of the vulnerability, attackers with local access could leverage it to compromise system integrity or cause crashes, impacting the reliability of security analysis workflows.
Potential Impact
For European organizations, the impact of CVE-2025-67873 depends largely on the deployment of capstone within their security infrastructure. Organizations involved in cybersecurity research, malware analysis, reverse engineering, or software development that utilize capstone could face risks of system crashes, data corruption, or potential privilege escalation if the vulnerability is exploited. The heap overflow could allow attackers to execute arbitrary code or disrupt disassembly processes, undermining the integrity and availability of critical analysis tools. This may lead to delays in threat detection or forensic investigations. Although exploitation requires local access and user interaction, insider threats or compromised user accounts could facilitate attacks. The confidentiality of sensitive analysis data might also be at risk if memory corruption leads to information leakage. Given the medium CVSS score and the requirement for local access, the threat is moderate but should not be underestimated in high-security environments. Failure to patch could expose organizations to targeted attacks aiming to disable or manipulate security tooling, which is particularly concerning for critical infrastructure operators and government agencies in Europe.
Mitigation Recommendations
1. Upgrade capstone to a version later than 6.0.0-Alpha5 that includes the fix from commit cbef767ab33b82166d263895f24084b75b316df3. 2. If upgrading is not immediately possible, apply the patch manually to enforce bounds checking on skipdata length in the skipdata callback. 3. Restrict local access to systems running capstone-based tools to trusted users only, minimizing the risk of exploitation by unprivileged users. 4. Implement strict user account controls and monitor for unusual user activity that might indicate attempts to exploit the vulnerability. 5. Employ application whitelisting and integrity monitoring on security analysis tools to detect unauthorized modifications or crashes. 6. Conduct regular security audits of software dependencies, especially those used in critical analysis workflows, to ensure timely patching of vulnerabilities. 7. Educate security analysts and developers about the risks of using vulnerable versions and encourage best practices in handling third-party libraries. 8. Consider sandboxing or isolating disassembly processes to limit the impact of potential memory corruption.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-12T18:53:03.237Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69431f35fab815a9fc1ded1d
Added to database: 12/17/2025, 9:23:01 PM
Last enriched: 12/24/2025, 9:51:25 PM
Last updated: 2/5/2026, 2:49:21 AM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.