CVE-2025-29484

7.5 HIGH

📋 TL;DR

CVE-2025-29484 is an out-of-memory vulnerability in libming's parseABC_NS_SET_INFO function that allows attackers to trigger allocator exhaustion, leading to Denial of Service (DoS). This affects systems using libming v0.4.8 to parse SWF/Flash content. Organizations processing untrusted SWF files are at risk.

💻 Affected Systems

Products:
  • libming
Versions: v0.4.8
Operating Systems: All platforms running libming
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems that use libming to parse SWF/Flash files. Applications must call the vulnerable parseABC_NS_SET_INFO function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to memory exhaustion crashes, potentially affecting all applications using the vulnerable libming library.

🟠

Likely Case

Application crashes or hangs when processing malicious SWF files, causing temporary DoS until services restart.

🟢

If Mitigated

Limited impact with proper input validation and memory limits, though crashes may still occur with specifically crafted files.

🌐 Internet-Facing: MEDIUM - Only affects systems processing SWF files from untrusted sources, which is less common in modern web environments.
🏢 Internal Only: LOW - Requires processing of malicious SWF files, which is typically limited to specific applications rather than general systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting a malicious SWF file that triggers the memory allocation issue. No authentication is needed if the application processes external files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check upstream libming repository for fixes

Vendor Advisory: https://github.com/libming/libming/issues/330

Restart Required: No

Instructions:

1. Monitor libming repository for patch release. 2. Update to patched version when available. 3. Recompile applications using libming if statically linked.

🔧 Temporary Workarounds

Input validation and file restrictions

all

Implement strict validation of SWF files before processing and limit file sizes

Memory limit enforcement

linux

Configure memory limits for processes using libming to prevent complete system exhaustion

ulimit -v [LIMIT_IN_KB] # For Linux systems

🧯 If You Can't Patch

  • Isolate systems processing SWF files in restricted environments
  • Implement network segmentation to limit blast radius if DoS occurs

🔍 How to Verify

Check if Vulnerable:

Check if libming v0.4.8 is installed and used by applications: ldd /path/to/application | grep ming

Check Version:

strings /usr/lib/libming.so | grep -i version || ming --version 2>/dev/null

Verify Fix Applied:

Verify libming version is updated beyond v0.4.8 and test with known malicious SWF files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with out-of-memory errors
  • Process termination when parsing SWF files
  • High memory usage spikes

Network Indicators:

  • Unusually large SWF file uploads
  • Multiple failed parsing attempts

SIEM Query:

source="application.log" ("out of memory" OR "allocator exhaustion" OR "parseABC") AND process="*ming*"

🔗 References

📤 Share & Export