CVE-2025-2174
📋 TL;DR
An integer overflow vulnerability in libzvbi's vbi_strndup_iconv_ucs2 function allows remote attackers to potentially cause denial of service or execute arbitrary code. This affects systems using libzvbi up to version 0.2.43 for processing teletext data. The vulnerability is remotely exploitable and has a public exploit available.
💻 Affected Systems
- libzvbi
📦 What is this software?
Zvbi by Zapping Vbi
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise
Likely Case
Denial of service through application crash or memory corruption
If Mitigated
Limited impact if proper memory protections (ASLR, DEP) are enabled
🎯 Exploit Status
Exploit disclosed publicly, requires specific input to trigger integer overflow
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.2.44
Vendor Advisory: https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf
Restart Required: Yes
Instructions:
1. Download libzvbi 0.2.44 from official repository
2. Compile and install following standard ./configure, make, make install
3. Restart any services using libzvbi
4. Recompile any applications linked against libzvbi
🔧 Temporary Workarounds
Disable vulnerable functionality
allDisable teletext/closed caption processing in applications using libzvbi
Application-specific configuration changes required
🧯 If You Can't Patch
- Implement strict input validation for libzvbi data sources
- Deploy memory protection mechanisms (ASLR, DEP, stack canaries)
🔍 How to Verify
Check if Vulnerable:
Check libzvbi version: pkg-config --modversion zvbi-0.2
Check Version:
pkg-config --modversion zvbi-0.2
Verify Fix Applied:
Verify version is 0.2.44 or higher: pkg-config --modversion zvbi-0.2
📡 Detection & Monitoring
Log Indicators:
- Application crashes with libzvbi in stack trace
- Memory corruption errors in system logs
Network Indicators:
- Unexpected teletext data streams to vulnerable services
SIEM Query:
search 'libzvbi' OR 'zvbi' in application crash logs
🔗 References
- https://github.com/zapping-vbi/zvbi/commit/ca1672134b3e2962cd392212c73f44f8f4cb489f
- https://github.com/zapping-vbi/zvbi/releases/tag/v0.2.44
- https://github.com/zapping-vbi/zvbi/security/advisories/GHSA-g7cg-7gw9-v8cf
- https://vuldb.com/?ctiid.299203
- https://vuldb.com/?id.299203
- https://vuldb.com/?submit.512800