CVE-2025-47229: CWE-617 Reachable Assertion in GNU PSPP
libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a denial of service (var_set_leave_quiet assertion failure and application exit) via crafted input data, such as data that triggers a call from src/data/dictionary.c code into src/data/variable.c code.
AI Analysis
Technical Summary
CVE-2025-47229 is a vulnerability identified in GNU PSPP, an open-source statistical analysis software often used as a free alternative to proprietary tools like SPSS. The issue resides in the libpspp-core.a library, specifically affecting versions through 2.0.1. The vulnerability is classified as a reachable assertion failure (CWE-617), which occurs when crafted input data triggers an assertion failure in the var_set_leave_quiet function. This function is called via a code path from src/data/dictionary.c into src/data/variable.c. The assertion failure causes the application to exit unexpectedly, resulting in a denial of service (DoS). The CVSS 3.1 base score is 2.9, indicating a low severity level. The attack vector is local (AV:L), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:L) with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability does not allow remote exploitation and requires local access, making it less critical but still a concern for environments where PSPP is used for statistical data processing and availability is important.
Potential Impact
For European organizations, the impact of this vulnerability is primarily a potential denial of service affecting availability of the PSPP application. Since PSPP is used in academic, research, and some governmental statistical analysis contexts, an attacker with local access could cause the software to crash, interrupting data analysis workflows. This could delay research projects, data reporting, or decision-making processes that rely on PSPP. However, the low CVSS score and requirement for local access limit the threat's scope. Confidentiality and integrity of data are not affected, so sensitive data exposure or manipulation is not a concern here. Organizations with automated or batch processing using PSPP might experience disruptions if crafted input data is processed without validation. Overall, the impact is operational disruption rather than data breach or system compromise.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict local access to systems running PSPP to trusted users only, minimizing the risk of malicious input data being introduced. 2) Implement input validation and sanitization on data files before processing them with PSPP to prevent crafted inputs that trigger the assertion failure. 3) Monitor PSPP application logs and system stability to detect unexpected crashes or assertion failures promptly. 4) Isolate PSPP processing environments, especially if used in multi-user or shared systems, to contain potential denial of service impacts. 5) Stay updated with GNU PSPP releases and apply patches as soon as they become available, even though no patch links are currently provided. 6) Consider alternative statistical tools or additional redundancy in workflows to maintain availability during potential PSPP downtime. These steps go beyond generic advice by focusing on access control, input validation, monitoring, and operational continuity specific to PSPP usage contexts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-47229: CWE-617 Reachable Assertion in GNU PSPP
Description
libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a denial of service (var_set_leave_quiet assertion failure and application exit) via crafted input data, such as data that triggers a call from src/data/dictionary.c code into src/data/variable.c code.
AI-Powered Analysis
Technical Analysis
CVE-2025-47229 is a vulnerability identified in GNU PSPP, an open-source statistical analysis software often used as a free alternative to proprietary tools like SPSS. The issue resides in the libpspp-core.a library, specifically affecting versions through 2.0.1. The vulnerability is classified as a reachable assertion failure (CWE-617), which occurs when crafted input data triggers an assertion failure in the var_set_leave_quiet function. This function is called via a code path from src/data/dictionary.c into src/data/variable.c. The assertion failure causes the application to exit unexpectedly, resulting in a denial of service (DoS). The CVSS 3.1 base score is 2.9, indicating a low severity level. The attack vector is local (AV:L), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:L) with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability does not allow remote exploitation and requires local access, making it less critical but still a concern for environments where PSPP is used for statistical data processing and availability is important.
Potential Impact
For European organizations, the impact of this vulnerability is primarily a potential denial of service affecting availability of the PSPP application. Since PSPP is used in academic, research, and some governmental statistical analysis contexts, an attacker with local access could cause the software to crash, interrupting data analysis workflows. This could delay research projects, data reporting, or decision-making processes that rely on PSPP. However, the low CVSS score and requirement for local access limit the threat's scope. Confidentiality and integrity of data are not affected, so sensitive data exposure or manipulation is not a concern here. Organizations with automated or batch processing using PSPP might experience disruptions if crafted input data is processed without validation. Overall, the impact is operational disruption rather than data breach or system compromise.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict local access to systems running PSPP to trusted users only, minimizing the risk of malicious input data being introduced. 2) Implement input validation and sanitization on data files before processing them with PSPP to prevent crafted inputs that trigger the assertion failure. 3) Monitor PSPP application logs and system stability to detect unexpected crashes or assertion failures promptly. 4) Isolate PSPP processing environments, especially if used in multi-user or shared systems, to contain potential denial of service impacts. 5) Stay updated with GNU PSPP releases and apply patches as soon as they become available, even though no patch links are currently provided. 6) Consider alternative statistical tools or additional redundancy in workflows to maintain availability during potential PSPP downtime. These steps go beyond generic advice by focusing on access control, input validation, monitoring, and operational continuity specific to PSPP usage contexts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-05-03T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc4f0
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 12:27:31 AM
Last updated: 8/13/2025, 11:08:06 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.