Out-of-Bounds Affecting libstb package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-LIBSTB-9680214
  • published14 Apr 2025
  • disclosed8 Apr 2025

Introduced: 8 Apr 2025

NewCVE-2025-3409  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 libstb.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libstb package and not the libstb package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

A vulnerability classified as critical has been found in Nothings stb up to f056911. This affects the function stb_include_string. The manipulation of the argument path_to_includes leads to stack-based buffer overflow. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Base Scores

version 3.1