CVE-2025-5399
EUVD-2025-1737107.06.2025, 08:15
Due to a mistake in libcurl's WebSocket code, a malicious server can send a particularly crafted packet which makes libcurl get trapped in an endless busy-loop. There is no other way for the application to escape or exit this loop other than killing the thread/process. This might be used to DoS libcurl-using application.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| haxx | curl | 8.13.0 ≤ 𝑥 < 8.14.1 |
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| curl | curl | 𝑥 ≤ 8.14.0 | CNA |
| curl | curl | 𝑥 ≤ 8.13.0 | CNA |
Debian Releases
Ubuntu Releases
openSUSE / SLES Releases
openSUSE Product | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| curl |
| ||||||||||||
| libcurl-devel |
| ||||||||||||
| libcurl4 |
| ||||||||||||
| libcurl4-32bit |
|
Common Weakness Enumeration