CVE-2025-68381
MEDIUMDescription
Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| elasticsearch | packetbeat |
| elasticsearch | packetbeat |
| elasticsearch | packetbeat |
| elasticsearch | packetbeat |
References
Frequently Asked Questions
What is CVE-2025-68381? +
How severe is CVE-2025-68381? +
What products are affected by CVE-2025-68381? +
How do I check if I'm vulnerable to CVE-2025-68381? +
Related Vulnerabilities
The method "sock_recvfrom_into()" of "asyncio.ProacterEventLoop" (Windows only) was missing a boundary check for the data buffer when using nbytes parameter. …
editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have …
Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by an invalid VerticesPerRow value in a PDF shading dictionary.
Out-of-bounds Write vulnerability in PointCloudLibrary pcl allows Overflow Buffers. Since version 1.14.0, PCL by default uses a zlib installation from …
We have identified a buffer overflow issue allowing out-of-bounds write when processing LLMNR or mDNS queries with very long DNS …
An Out-of-bounds Write vulnerability exists within the parsing of PRJ files. The issues result from the lack of proper validation …