A stack buffer overflow vulnerability exists in the buffer_get function of duc, a disk management tool, where a condition can evaluate to true due to underflow, allowing an out-of-bounds read.
References
| Link | Resource |
|---|---|
| https://github.com/zevv/duc/releases/tag/1.4.6 | Release Notes |
| https://hackingbydoing.wixsite.com/hackingbydoing/post/stack-buffer-overflow-in-duc | Exploit Third Party Advisory |
| https://kb.cert.org/vuls/id/441887 | Third Party Advisory |
| https://github.com/zevv/duc/commit/8638c4365ffd9e1966bdef8af6339dbee8c17e66 | |
| https://www.kb.cert.org/vuls/id/441887 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-05 13:16
Updated : 2026-01-29 19:16
NVD link : CVE-2025-13654
Mitre link : CVE-2025-13654
CVE.ORG link : CVE-2025-13654
JSON object : View
Products Affected
zevv
- duc
CWE
CWE-787
Out-of-bounds Write
