CVE-2025-15535

3.3 LOW

📋 TL;DR

A null pointer dereference vulnerability in nicbarker clay library versions up to 0.14 allows local attackers to cause denial of service through the Clay__MeasureTextCached function. This affects any software using the vulnerable clay.h library. The exploit requires local access to the system.

💻 Affected Systems

Products:
  • nicbarker clay library
Versions: All versions up to and including 0.14
Operating Systems: All platforms where clay library is used
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects software that uses the Clay__MeasureTextCached function from clay.h

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crash leading to denial of service for the affected software component

🟠

Likely Case

Local denial of service causing application instability or termination

🟢

If Mitigated

Minimal impact with proper privilege separation and sandboxing

🌐 Internet-Facing: LOW - requires local access, not remotely exploitable
🏢 Internal Only: MEDIUM - local users could disrupt applications using the library

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on GitHub, requires local access to execute

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Monitor the GitHub repository for updates: https://github.com/nicbarker/clay

🔧 Temporary Workarounds

Remove or disable clay library

all

Uninstall or disable the vulnerable clay library from affected systems

Check package manager for removal commands specific to your distribution

Sandbox applications using clay

linux

Run applications that use the clay library in restricted environments

Use containerization (Docker) with limited privileges
Implement SELinux/AppArmor policies

🧯 If You Can't Patch

  • Implement strict local access controls to limit who can execute code on affected systems
  • Monitor system logs for application crashes related to clay library usage

🔍 How to Verify

Check if Vulnerable:

Check if clay library version 0.14 or earlier is installed: 'find / -name "*clay*" -type f 2>/dev/null' and examine version information

Check Version:

Check library files or package manager for clay version (e.g., 'dpkg -l | grep clay' on Debian-based systems)

Verify Fix Applied:

Verify clay library is removed or updated to version above 0.14 when available

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Null pointer exception logs from applications using clay

Network Indicators:

  • No network indicators - local exploit only

SIEM Query:

Search for process termination events with exit code 139 (SIGSEGV) from applications known to use clay library

🔗 References

📤 Share & Export