Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-47256 PoC — Libxmp 安全漏洞

Source
Associated Vulnerability
Title:Libxmp 安全漏洞 (CVE-2025-47256)
Description:Libxmp是Libxmp开源的一个将模块文件呈现为PCM数据的库。 Libxmp 4.6.2及之前版本存在安全漏洞,该漏洞源于loaders/prowizard/pha.c中depack_pha存在栈缓冲区溢出。
Description
Stack overflow in LibXMP
Readme
# CVE-2025-47256
Stack overflow in LibXMP

# Description
A stack-based buffer overflow vulnerability exists in the depack_pha() function of libxmp, a library for module music playback. The vulnerability is triggered when parsing malformed Pha Packer (PHA) module files.

Improper bounds checking on a local stack buffer allows an attacker to write data outside the bounds of the array, potentially leading to denial-of-service (DoS), and in certain conditions, remote code execution (RCE).

Build:
`gcc -g -O0 -I./libxmp/include poc.c poc_data.h ./libxmp/lib/libxmp.a -lm -lz -o poc_crasher`

# Vulnerability Type
Stack Buffer Overflow

# Vendor
libxmp project
GitHub: https://github.com/libxmp/libxmp
Issue: https://github.com/libxmp/libxmp/issues/847

# Affected Component
src/loaders/prowizard/pha.c
Function: depack_pha()

# Impacts
Denial of Service (DoS)
Potential Remote Code Execution (RCE) under specific build or runtime conditions

# Attack Vectors
An attacker can craft a malicious .mod or .pha file in Pha Packer format and feed it to any application linked with libxmp. The malformed file causes a stack buffer overflow during pattern parsing in depack_pha().

# Vendor Acknowledgment
This issue is in the process of being reported to the libxmp maintainers via GitHub Issues.

# Discoverer
Gareth C - https://www.anchorsec.co.uk
File Snapshot

[4.0K] /data/pocs/9da81f425b3e1d793c93f0b02454cf07852bf90f ├── [ 720] poc.c ├── [158K] poc_data.h └── [1.3K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.