ping in iputils before 20250602 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication.
References
| Link | Resource |
|---|---|
| https://bugzilla.suse.com/show_bug.cgi?id=1242300 | Issue Tracking |
| https://github.com/Zephkek/ping-rtt-overflow/ | Exploit |
| https://github.com/iputils/iputils/commit/070cfacd7348386173231fb16fad4983d4e6ae40 | |
| https://github.com/iputils/iputils/issues/584 | Exploit Issue Tracking Patch |
| https://github.com/iputils/iputils/pull/585 | Exploit Issue Tracking Patch |
| https://github.com/iputils/iputils/releases/tag/20250602 | |
| https://github.com/Zephkek/ping-rtt-overflow/ | Exploit |
Configurations
History
No history.
Information
Published : 2025-05-05 14:15
Updated : 2026-01-26 17:16
NVD link : CVE-2025-47268
Mitre link : CVE-2025-47268
CVE.ORG link : CVE-2025-47268
JSON object : View
Products Affected
iputils_project
- iputils
CWE
CWE-190
Integer Overflow or Wraparound
