Incorrect Calculation of Buffer Size Affecting jvde-github/AIS-catcher package, versions [,0.64)


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-JVDEGITHUBAISCATCHER-14151786
  • published30 Nov 2025
  • disclosed29 Nov 2025
  • creditUnknown

Introduced: 29 Nov 2025

NewCVE-2025-66216  (opens in a new tab)
CWE-131  (opens in a new tab)

How to fix?

Upgrade jvde-github/AIS-catcher to version 0.64 or higher.

Overview

Affected versions of this package are vulnerable to Incorrect Calculation of Buffer Size via the Message::setUint function. An attacker can execute arbitrary code or cause a denial of service by supplying crafted input that overflows a heap buffer.

PoC

// poc.cpp
#include "Message.h"
int main() {
    AIS::Message msg;
    msg.clear();
    // Write to bit offset 2000 (byte 250), far beyond the 128-byte limit
    msg.setUint(2000, 32, 0xDEADBEEF);
    return 0;
}

References

CVSS Base Scores

version 4.0
version 3.1