{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T17:59:08.118","vulnerabilities":[{"cve":{"id":"CVE-2025-54492","sourceIdentifier":"talos-cna@cisco.com","published":"2025-08-25T14:15:35.807","lastModified":"2025-11-03T19:16:11.197","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 9141 of biosig.c on the current master branch (35a819fa), when the Tag is 67:\r\n\r\n                else if (tag==67)     //0x43: Sample skew\r\n                {\r\n                    int skew=0;     // [1]\r\n                    curPos += ifread(&skew, 1, len,hdr);\r\n\r\nIn this case, the address of the newly-defined integer `skew` \\[1\\] is overflowed instead of `buf`. This means a stack overflow can occur using much smaller values of `len` in this code path."},{"lang":"es","value":"Existe una vulnerabilidad de desbordamiento de búfer en la pila en la funcionalidad de análisis MFER de The Biosig Project libbiosig 3.9.0 y Master Branch (35a819fa). Un archivo MFER especialmente manipulado puede provocar la ejecución de código arbitrario. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad. Esta vulnerabilidad se manifiesta en la línea 9141 de biosig.c en la rama maestra actual (35a819fa), cuando la etiqueta es 67: else if (tag==67) //0x43: Sample skew { int skew=0; // [1] curPos += ifread(&amp;skew, 1, len,hdr); En este caso, se desborda la dirección del entero recién definido `skew` \\[1\\] en lugar de `buf`. Esto significa que puede producirse un desbordamiento de pila utilizando valores mucho menores de `len` en esta ruta de código."}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:libbiosig_project:libbiosig:*:*:*:*:*:*:*:*","versionEndExcluding":"3.9.1","matchCriteriaId":"4893D615-FD95-4393-A5B0-E1BE19F180A6"}]}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2025-2234","source":"talos-cna@cisco.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2234","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}