CVE-2025-32990
Published: 10 July 2025
Summary
CVE-2025-32990 is a medium-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Redhat Enterprise Linux. Its CVSS base score is 6.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked in the top 47.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Heap buffer overflow in certtool enables remote application exploitation resulting in memory corruption and DoS crash.
NVD Description
A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write,…
more
resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
Deeper analysisAI
CVE-2025-32990 is a heap-buffer-overflow vulnerability stemming from an off-by-one error in the GnuTLS software library, specifically within the template parsing logic of the certtool utility. This flaw occurs when certtool processes certain settings from a template file, enabling an out-of-bounds NULL pointer write that leads to memory corruption. The issue is classified under CWE-122 (Heap-based Buffer Overflow) and carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L), indicating medium severity with network accessibility, low attack complexity, and no requirements for privileges or user interaction.
An unauthenticated attacker can exploit this vulnerability remotely by supplying a maliciously crafted template file to a system running vulnerable versions of certtool. Successful exploitation triggers memory corruption, resulting in a denial-of-service condition that could crash the affected system. While the impact is limited to low integrity and availability disruption with no confidentiality loss, the lack of privileges needed makes it accessible to remote adversaries targeting GnuTLS deployments.
Red Hat has addressed this vulnerability through multiple errata releases, including RHSA-2025:16115, RHSA-2025:16116, RHSA-2025:17181, RHSA-2025:17348, and RHSA-2025:17361, which provide updated packages for affected Red Hat products using GnuTLS. Security practitioners should apply these patches promptly to mitigate the risk of exploitation.
Details
- CWE(s)