VYPR
Medium severity6.5OSV Advisory· Published Jul 16, 2025· Updated Apr 15, 2026

CVE-2025-40913

CVE-2025-40913

Description

Net::Dropbear versions through 0.16 for Perl contains a dependency that may be susceptible to an integer overflow.

Net::Dropbear embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Net::Dropbear up to 0.16 embeds a vulnerable libtommath with an integer overflow in mp_grow, potentially leading to code execution or DoS.

Vulnerability

Overview

Net::Dropbear, a Perl module for Dropbear SSH integration, embeds a copy of the libtommath library. Versions up to and including 0.16 ship with a version of libtommath that contains an integer overflow vulnerability in the mp_grow function, identified as CVE-2023-36328 [1][2]. This flaw occurs when the function attempts to resize an integer's internal storage, potentially leading to an undersized allocation.

Exploitation

An attacker could exploit this vulnerability by providing input that triggers a large integer operation, causing mp_grow to miscalculate the required memory size. The resulting heap buffer overflow may be leveraged to corrupt adjacent memory. The attack surface depends on how Net::Dropbear processes external data; if the module handles untrusted input (e.g., key material or network data), remote exploitation may be possible.

Impact

Successful exploitation could allow an attacker to execute arbitrary code or cause a denial of service (DoS) [1][2]. The vulnerability is rated Medium severity with a CVSS v3 score of 6.5, reflecting the potential for significant impact under certain conditions.

Mitigation

The vulnerable code resides in bn_mp_grow.c [3]. Users should update Net::Dropbear to a version that includes a patched libtommath, or apply the fix from the upstream libtommath repository [1]. No workaround is currently documented; upgrading is the recommended course of action.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

1

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.