{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T22:55:03.480","vulnerabilities":[{"cve":{"id":"CVE-2025-47436","sourceIdentifier":"security@apache.org","published":"2025-05-14T14:15:30.703","lastModified":"2025-07-14T14:55:25.397","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Heap-based Buffer Overflow vulnerability in Apache ORC.\n\nA vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption.\n\nThis issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1.\n\nUsers are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue."},{"lang":"es","value":"Vulnerabilidad de desbordamiento de búfer basado en montón en Apache ORC. Se ha identificado una vulnerabilidad en la lógica de descompresión LZO de ORC C++. Archivos ORC malformados, especialmente manipulados, pueden provocar que el descompresor asigne un búfer de 250 bytes, pero luego intente copiar 295 bytes en él. Esto causa corrupción de memoria. Este problema afecta a la librería Apache ORC C++: hasta la versión 1.8.8, de la 1.9.0 a la 1.9.5, de la 2.0.0 a la 2.0.4 y de la 2.1.0 a la 2.1.1. Se recomienda a los usuarios actualizar a las versiones 1.8.9, 1.9.6, 2.0.5 y 2.1.2, que solucionan el problema."}],"metrics":{"cvssMetricV40":[{"source":"security@apache.org","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:X/R:X/V:X/RE:M/U:Amber","baseScore":6.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"ACTIVE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"LOW","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NEGLIGIBLE","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-122"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:orc:*:*:*:*:*:*:*:*","versionEndExcluding":"1.8.9","matchCriteriaId":"CE62FF1F-4F28-4FBF-93B2-76E0A6B88894"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:orc:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9.0","versionEndExcluding":"1.9.6","matchCriteriaId":"463A880A-5E0D-4053-A5B2-CA8A4D017884"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:orc:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.0.5","matchCriteriaId":"C43D654F-8615-475C-B189-BEE6A6125C9A"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:orc:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.0","versionEndExcluding":"2.1.2","matchCriteriaId":"B2EC5BDD-B101-47E3-BABD-81543F6405D3"}]}]}],"references":[{"url":"https://lists.apache.org/thread/kd6tlv8fs5jybmsgxr4vrkdxyc866wrn","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"https://orc.apache.org/security/CVE-2025-47436/","source":"security@apache.org","tags":["Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2025/05/13/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]}]}}]}