{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T05:09:08.013","vulnerabilities":[{"cve":{"id":"CVE-2025-54490","sourceIdentifier":"talos-cna@cisco.com","published":"2025-08-25T14:15:35.420","lastModified":"2025-11-03T19:16:10.980","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 9090 of biosig.c on the current master branch (35a819fa), when the Tag is 64:\r\n\r\n                else if (tag==64)     //0x40\r\n                {\r\n                    // preamble\r\n                    char tmp[256];  // [1]\r\n                    curPos += ifread(tmp,1,len,hdr);\r\n\r\nIn this case, the overflowed buffer is the newly-declared `tmp` \\[1\\] instead of `buf`. While `tmp` is larger than `buf`, having a size of 256 bytes, a stack overflow can still occur in cases where `len` is encoded using multiple octets and is greater than 256."},{"lang":"es","value":"Existe una vulnerabilidad de desbordamiento de búfer en la pila en la funcionalidad de análisis MFER de The Biosig Project libbiosig 3.9.0 y Master Branch (35a819fa). Un archivo MFER especialmente manipulado puede provocar la ejecución de código arbitrario. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad. Esta vulnerabilidad se manifiesta en la línea 9090 de biosig.c en la rama maestra actual (35a819fa), cuando la etiqueta es 64: else if (tag==64) //0x40 { // preámbulo char tmp[256]; // [1] curPos += ifread(tmp,1,len,hdr); En este caso, el búfer desbordado es el recién declarado `tmp` \\[1\\] en lugar de `buf`. Si bien `tmp` es más grande que `buf`, con un tamaño de 256 bytes, aún puede ocurrir un desbordamiento de pila en los casos en que `len` se codifica utilizando múltiples octetos y es mayor a 256."}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:libbiosig_project:libbiosig:*:*:*:*:*:*:*:*","versionEndExcluding":"3.9.1","matchCriteriaId":"4893D615-FD95-4393-A5B0-E1BE19F180A6"}]}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2025-2234","source":"talos-cna@cisco.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2234","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}