CVE-2026-2259

A vulnerability has been found in aardappel lobster up to 2025.4. Affected by this issue is the function lobster::Parser::ParseStatements in the library dev/src/lobster/parser.h of the component Parsing. The manipulation leads to memory corruption. The attack can only be performed from a local environment. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2f45fe860d00990e79e13250251c1dde633f1f89. Applying a patch is the recommended action to fix this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:strlen:lobster:*:*:*:*:*:*:*:*

History

17 Feb 2026, 15:08

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:a:strlen:lobster:*:*:*:*:*:*:*:*
First Time Strlen
Strlen lobster
Summary
  • (es) Una vulnerabilidad ha sido encontrada en aardappel lobster hasta 2025.4. Afectada por este problema es la función lobster::Parser::ParseStatements en la biblioteca dev/src/lobster/parser.h del componente Parsing. La manipulación conduce a corrupción de memoria. El ataque solo puede ser realizado desde un entorno local. El exploit ha sido divulgado al público y puede ser usado. El identificador del parche es 2f45fe860d00990e79e13250251c1dde633f1f89. Aplicar un parche es la acción recomendada para solucionar este problema.
References () https://github.com/aardappel/lobster/ - () https://github.com/aardappel/lobster/ - Product
References () https://github.com/aardappel/lobster/commit/2f45fe860d00990e79e13250251c1dde633f1f89 - () https://github.com/aardappel/lobster/commit/2f45fe860d00990e79e13250251c1dde633f1f89 - Patch
References () https://github.com/aardappel/lobster/issues/396 - () https://github.com/aardappel/lobster/issues/396 - Patch, Vendor Advisory, Issue Tracking
References () https://github.com/aardappel/lobster/issues/396#issuecomment-3849019040 - () https://github.com/aardappel/lobster/issues/396#issuecomment-3849019040 - Patch, Vendor Advisory, Issue Tracking
References () https://github.com/oneafter/0204/blob/main/lob2/repro.lobster - () https://github.com/oneafter/0204/blob/main/lob2/repro.lobster - Exploit
References () https://vuldb.com/?ctiid.345006 - () https://vuldb.com/?ctiid.345006 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.345006 - () https://vuldb.com/?id.345006 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.753168 - () https://vuldb.com/?submit.753168 - Exploit, Third Party Advisory, VDB Entry

10 Feb 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-10 04:16

Updated : 2026-02-17 15:08


NVD link : CVE-2026-2259

Mitre link : CVE-2026-2259

CVE.ORG link : CVE-2026-2259


JSON object : View

Products Affected

strlen

  • lobster
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-787

Out-of-bounds Write