{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5688","assignerOrgId":"ff89ba41-3aa1-4d27-914a-91399e9639e5","state":"PUBLISHED","assignerShortName":"AMZN","dateReserved":"2025-06-04T15:11:43.065Z","datePublished":"2025-06-04T17:09:54.718Z","dateUpdated":"2025-10-14T18:05:10.779Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://github.com/FreeRTOS/FreeRTOS-Plus-TCP","defaultStatus":"unaffected","packageName":"FreeRTOS-Plus-TCP","product":"FreeRTOS","vendor":"Amazon","versions":[{"lessThan":"4.3.2","status":"affected","version":"2.3.4","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>We have identified a buffer overflow issue allowing out-of-bounds write when processing LLMNR or mDNS queries with very long DNS names. This issue only affects systems using Buffer Allocation Scheme 1 with LLMNR or mDNS enabled.</p><p><br>Users should upgrade to the latest version and ensure any forked or derivative code is patched to incorporate the new fixes. </p><br>"}],"value":"We have identified a buffer overflow issue allowing out-of-bounds write when processing LLMNR or mDNS queries with very long DNS names. This issue only affects systems using Buffer Allocation Scheme 1 with LLMNR or mDNS enabled.\n\n\nUsers should upgrade to the latest version and ensure any forked or derivative code is patched to incorporate the new fixes."}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100: Overflow Buffers"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"LOCAL","baseScore":7.5,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787: Out-of-bounds Write","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"ff89ba41-3aa1-4d27-914a-91399e9639e5","shortName":"AMZN","dateUpdated":"2025-10-14T18:05:10.779Z"},"references":[{"tags":["vendor-advisory"],"url":"https://aws.amazon.com/security/security-bulletins/AWS-2025-012/"},{"tags":["patch"],"url":"https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.3.2"},{"tags":["vendor-advisory"],"url":"https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-5x4f-fvv8-wr65"}],"source":{"discovery":"UNKNOWN"},"title":"Out of Bounds Write in FreeRTOS-Plus-TCP","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-04T18:12:03.678492Z","id":"CVE-2025-5688","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-04T18:18:46.071Z"}}]}}