Description
Heap-based Buffer Overflow vulnerability in Apache ORC. A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption. This issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1. Users are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue.
References (3)
Core 3
Core References
Third Party Advisory vendor-advisory
https://orc.apache.org/security/CVE-2025-47436/
Mailing List, Vendor Advisory mailing-list
https://lists.apache.org/thread/kd6tlv8fs5jybmsgxr4vrkdxyc866wrn
Mailing List, Third Party Advisory
http://www.openwall.com/lists/oss-security/2025/05/13/4
Scores
CVSS v3
9.8
EPSS
0.0029
EPSS Percentile
52.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-122
Status
published
Products (1)
apache/orc
< 1.8.9
Published
May 14, 2025
Tracked Since
Feb 18, 2026