Hello, Thank you for contacting me. I did not know that there some
reported vulnerability as nobody contacted me before you.

I will prepare update of debian package with the fix.

On Saturday 20 December 2025 21:11:54 Salvatore Bonaccorso wrote:
> Source: igmpproxy
> Version: 0.3-1
> Severity: important
> Tags: security upstream
> Forwarded: https://github.com/pali/igmpproxy/issues/97
> X-Debbugs-Cc: [email protected], Debian Security Team 
> <[email protected]>
> 
> Hi,
> 
> The following vulnerability was published for igmpproxy.
> 
> CVE-2025-50681[0]:
> | igmpproxy 0.4 before commit 2b30c36 allows remote attackers to cause
> | a denial of service (application crash) via a crafted IGMPv3
> | membership report packet with a malicious source address. Due to
> | insufficient validation in the `recv_igmp()` function in
> | src/igmpproxy.c, an invalid group record type can trigger a NULL
> | pointer dereference when logging the address using `inet_fmtsrc()`.
> | This vulnerability can be exploited by sending malformed multicast
> | traffic to a host running igmpproxy, leading to a crash. igmpproxy
> | is used in various embedded networking environments and consumer-
> | grade IoT devices (such as home routers and media gateways) to
> | handle multicast traffic for IPTV and other streaming services.
> | Affected devices that rely on unpatched versions of igmpproxy may be
> | vulnerable to remote denial-of-service attacks across a LAN .
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2025-50681
>     https://www.cve.org/CVERecord?id=CVE-2025-50681
> [1] https://github.com/pali/igmpproxy/issues/97
> [2] 
> https://github.com/younix/igmpproxy/commit/2b30c36e6ab5b21defb76ec6458ab7687984484c
> 
> Regards,
> Salvatore

Reply via email to