CVE-2025-40913
Description
Net::Dropbear versions through 0.16 for Perl contains a dependency that may be susceptible to an integer overflow.
Net::Dropbear embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Net::Dropbear up to 0.16 embeds a vulnerable libtommath with an integer overflow in mp_grow, potentially leading to code execution or DoS.
Vulnerability
Overview
Net::Dropbear, a Perl module for Dropbear SSH integration, embeds a copy of the libtommath library. Versions up to and including 0.16 ship with a version of libtommath that contains an integer overflow vulnerability in the mp_grow function, identified as CVE-2023-36328 [1][2]. This flaw occurs when the function attempts to resize an integer's internal storage, potentially leading to an undersized allocation.
Exploitation
An attacker could exploit this vulnerability by providing input that triggers a large integer operation, causing mp_grow to miscalculate the required memory size. The resulting heap buffer overflow may be leveraged to corrupt adjacent memory. The attack surface depends on how Net::Dropbear processes external data; if the module handles untrusted input (e.g., key material or network data), remote exploitation may be possible.
Impact
Successful exploitation could allow an attacker to execute arbitrary code or cause a denial of service (DoS) [1][2]. The vulnerability is rated Medium severity with a CVSS v3 score of 6.5, reflecting the potential for significant impact under certain conditions.
Mitigation
The vulnerable code resides in bn_mp_grow.c [3]. Users should update Net::Dropbear to a version that includes a patched libtommath, or apply the fix from the upstream libtommath repository [1]. No workaround is currently documented; upgrading is the recommended course of action.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: 0.01, 0.02, 0.03, …
Patches
17bbc1f8e4fe6Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.