CVE-2025-47436

CRITICAL

Apache Orc < 1.8.9 - Heap Buffer Overflow

Title source: rule
STIX 2.1

Description

Heap-based Buffer Overflow vulnerability in Apache ORC. A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption. This issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1. Users are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue.

References (3)

Core 3
Core References
Third Party Advisory vendor-advisory
https://orc.apache.org/security/CVE-2025-47436/
Mailing List, Vendor Advisory mailing-list
https://lists.apache.org/thread/kd6tlv8fs5jybmsgxr4vrkdxyc866wrn
Mailing List, Third Party Advisory
http://www.openwall.com/lists/oss-security/2025/05/13/4

Scores

CVSS v3 9.8
EPSS 0.0029
EPSS Percentile 52.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-122
Status published
Products (1)
apache/orc < 1.8.9
Published May 14, 2025
Tracked Since Feb 18, 2026