目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-32913 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Libsoup: null pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in content-disposition header
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
空指针解引用
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
libsoup 代码问题漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
libsoup是GNOME项目的一款GNOME的HTTP客户端/服务器库。 libsoup存在代码问题漏洞,该漏洞源于函数soup_message_headers_get_content_disposition存在空指针取消引用,可能导致客户端或服务器崩溃。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Red HatRed Hat Enterprise Linux 7 Extended Lifecycle Support 0:2.62.2-9.el7_9 ~ * cpe:/o:redhat:rhel_els:7
Red HatRed Hat Enterprise Linux 7 Extended Lifecycle Support 0:2.62.2-6.el7_9 ~ * cpe:/o:redhat:rhel_els:7
Red HatRed Hat Enterprise Linux 8 0:2.62.3-8.el8_10 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8 0:2.8-3.el8_10.1 ~ * cpe:/a:redhat:enterprise_linux:8::crb
Red HatRed Hat Enterprise Linux 8 0:8.10-1 ~ * cpe:/a:redhat:enterprise_linux:8::crb
Red HatRed Hat Enterprise Linux 8 0:2.62.3-8.el8_10 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.2 Advanced Update Support 0:2.62.3-1.el8_2.4 ~ * cpe:/a:redhat:rhel_aus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 0:2.62.3-2.el8_4.4 ~ * cpe:/o:redhat:rhel_e4s:8.4::baseos
Red HatRed Hat Enterprise Linux 8.4 Telecommunications Update Service 0:2.62.3-2.el8_4.4 ~ * cpe:/o:redhat:rhel_e4s:8.4::baseos
Red HatRed Hat Enterprise Linux 8.4 Update Services for SAP Solutions 0:2.62.3-2.el8_4.4 ~ * cpe:/o:redhat:rhel_e4s:8.4::baseos
Red HatRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 0:2.62.3-2.el8_6.4 ~ * cpe:/o:redhat:rhel_tus:8.6::baseos
Red HatRed Hat Enterprise Linux 8.6 Telecommunications Update Service 0:2.62.3-2.el8_6.4 ~ * cpe:/o:redhat:rhel_tus:8.6::baseos
Red HatRed Hat Enterprise Linux 8.6 Update Services for SAP Solutions 0:2.62.3-2.el8_6.4 ~ * cpe:/o:redhat:rhel_tus:8.6::baseos
Red HatRed Hat Enterprise Linux 8.8 Extended Update Support 0:2.62.3-3.el8_8.4 ~ * cpe:/a:redhat:rhel_eus:8.8::appstream
Red HatRed Hat Enterprise Linux 9 0:2.72.0-10.el9_6.1 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions 0:2.72.0-8.el9_0.4 ~ * cpe:/a:redhat:rhel_e4s:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 0:2.72.0-8.el9_2.4 ~ * cpe:/a:redhat:rhel_eus:9.2::appstream
Red HatRed Hat Enterprise Linux 9.4 Extended Update Support 0:2.72.0-8.el9_4.4 ~ * cpe:/a:redhat:rhel_eus:9.4::appstream
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
二、漏洞 CVE-2025-32913 的公开POC
#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-32913 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-32913

暂无评论


发表评论