CVE-2025-50681 (CNNVD-202512-3731)
中文标题:
igmpproxy 安全漏洞
英文标题:
igmpproxy 0.4 before commit 2b30c36 allows remote attackers to cause a denial of service (applicatio...
漏洞描述
中文描述:
igmpproxy是pali个人开发者的一个路由守护进程。 igmpproxy存在安全漏洞,该漏洞源于src/igmpproxy.c中recv_igmp函数验证不足,可能导致空指针取消引用和拒绝服务。
英文描述:
igmpproxy 0.4 before commit 2b30c36 allows remote attackers to cause a denial of service (application crash) via a crafted IGMPv3 membership report packet with a malicious source address. Due to insufficient validation in the `recv_igmp()` function in src/igmpproxy.c, an invalid group record type can trigger a NULL pointer dereference when logging the address using `inet_fmtsrc()`. This vulnerability can be exploited by sending malformed multicast traffic to a host running igmpproxy, leading to a crash. igmpproxy is used in various embedded networking environments and consumer-grade IoT devices (such as home routers and media gateways) to handle multicast traffic for IPTV and other streaming services. Affected devices that rely on unpatched versions of igmpproxy may be vulnerable to remote denial-of-service attacks across a LAN .
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| pali | igmpproxy | 0.4 | - | - |
cpe:2.3:a:pali:igmpproxy:0.4:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (adp)
HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-50681 |
2025-12-21 02:11:30 | 2026-01-12 02:11:55 |
| NVD | nvd_CVE-2025-50681 |
2026-01-03 03:00:09 | 2026-01-12 02:27:52 |
| CNNVD | cnnvd_CNNVD-202512-3731 |
2026-01-11 06:15:03 | 2026-01-12 02:38:04 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202512-3731
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 1
- data_sources: ['cve'] -> ['cve', 'nvd']