
Cloud Vulnerability DB
A community-led vulnerabilities database
A problematic vulnerability was discovered in GNU libopts up to version 27.6, specifically affecting the _strstrsse2 function. The vulnerability was disclosed on August 8, 2025, and is tracked as CVE-2025-8746. The issue was initially reported to the tcpreplay project but was identified as residing in the external libopts library. This vulnerability only affects products that are no longer supported by the maintainer (VulDB, GitHub Issue).
The vulnerability is classified as a memory corruption issue, specifically a buffer over-read condition (CWE-119). The flaw occurs in the _strstrsse2 function within strstr.c at line 84:31. When triggered, the vulnerability causes a segmentation fault with a READ memory access at address 0xffffffffffffffe0. The CVSS v3.1 base score is 3.3 (LOW), with a vector string of AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L (VulDB, GitHub Issue).
The vulnerability leads to memory corruption and can cause program termination through segmentation faults. When exploited, it allows an attacker to read from memory locations outside the intended boundary of the buffer, potentially impacting system availability. The issue primarily affects the program's stability and can lead to denial of service conditions (VulDB).
Currently, there are no known official fixes or mitigations available for this vulnerability. Since the affected software is no longer supported by the maintainer, it is recommended to consider replacing the affected component with an alternative product (VulDB).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."