Out-of-bounds Write Affecting FreeRTOS/FreeRTOS-Plus-TCP package, versions [2.3.4,4.3.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-FREERTOSFREERTOSPLUSTCP-10381474
  • published18 Jun 2025
  • disclosed4 Jun 2025
  • creditUnknown

Introduced: 4 Jun 2025

NewCVE-2025-5688  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade FreeRTOS/FreeRTOS-Plus-TCP to version 4.3.2 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write due to the handling of LLMNR or mDNS queries with excessively long DNS names. An attacker can write data outside of the intended buffer boundaries by sending specially crafted network packets. This is only exploitable if Buffer Allocation Scheme 1 is used with LLMNR or mDNS enabled.

Note: If LLMNR is used with Buffer Allocation Scheme 1, the vulnerability affected versions v2.3.4 through v4.3.1. If mDNS is used with Buffer Allocation Scheme 1, the vulnerability affected versions v4.0.0 through v4.3.1.

CVSS Base Scores

version 4.0
version 3.1