CVE-2025-5001: Integer Overflow in GNU PSPP
A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5001 is an integer overflow vulnerability identified in the GNU PSPP software, specifically in the calloc function within the pspp-convert.c source file. PSPP is a free software application for statistical analysis of sampled data, often used as an alternative to proprietary tools like SPSS. The vulnerability arises from improper handling of the argument passed via the '-l' option, which leads to an integer overflow condition during memory allocation. This overflow can cause the program to allocate less memory than required, potentially leading to buffer overflows or memory corruption. Exploitation requires local access with at least low-level privileges (local privilege level) and does not require user interaction or elevated privileges. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild. The CVSS 4.0 base score is 4.8, indicating a medium severity level. The attack vector is local, with low attack complexity, no privileges required beyond local access, and no user interaction needed. The impact is limited to availability, with no direct confidentiality or integrity impact reported. This vulnerability could be leveraged by a local attacker to cause a denial of service or potentially execute arbitrary code if combined with other vulnerabilities or conditions, although no such exploitation has been confirmed. The lack of available patches at the time of disclosure suggests that users should apply mitigations or updates once available.
Potential Impact
For European organizations, the impact of CVE-2025-5001 is primarily on systems running GNU PSPP, which is commonly used in academic, research, and statistical analysis environments. The vulnerability could allow a local attacker to cause denial of service or potentially escalate privileges if combined with other exploits, disrupting critical data analysis workflows. This could affect universities, research institutions, government statistical agencies, and private sector companies relying on PSPP for data processing. Although the attack requires local access, insider threats or compromised user accounts could exploit this vulnerability. The medium severity rating suggests moderate risk, but the potential for disruption in data integrity and availability in research and analytics environments could have downstream effects on decision-making and reporting. Given the lack of remote exploitation capability, the threat is more contained but still relevant for organizations with multiple users or shared systems. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for vigilance.
Mitigation Recommendations
1. Restrict local access to systems running GNU PSPP to trusted users only, employing strict access controls and monitoring for unusual activity. 2. Implement application whitelisting and privilege separation to limit the ability of low-privilege users to execute or manipulate PSPP processes. 3. Monitor system logs and application behavior for signs of memory corruption or crashes related to PSPP usage. 4. Once patches or updates are released by the GNU project, apply them promptly to address the integer overflow vulnerability. 5. Consider running PSPP within sandboxed or containerized environments to limit the impact of potential exploitation. 6. Educate users about the risks of local exploitation and enforce strong endpoint security policies to prevent unauthorized local access. 7. Conduct regular security assessments and penetration testing focusing on local privilege escalation vectors to detect similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-5001: Integer Overflow in GNU PSPP
Description
A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5001 is an integer overflow vulnerability identified in the GNU PSPP software, specifically in the calloc function within the pspp-convert.c source file. PSPP is a free software application for statistical analysis of sampled data, often used as an alternative to proprietary tools like SPSS. The vulnerability arises from improper handling of the argument passed via the '-l' option, which leads to an integer overflow condition during memory allocation. This overflow can cause the program to allocate less memory than required, potentially leading to buffer overflows or memory corruption. Exploitation requires local access with at least low-level privileges (local privilege level) and does not require user interaction or elevated privileges. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild. The CVSS 4.0 base score is 4.8, indicating a medium severity level. The attack vector is local, with low attack complexity, no privileges required beyond local access, and no user interaction needed. The impact is limited to availability, with no direct confidentiality or integrity impact reported. This vulnerability could be leveraged by a local attacker to cause a denial of service or potentially execute arbitrary code if combined with other vulnerabilities or conditions, although no such exploitation has been confirmed. The lack of available patches at the time of disclosure suggests that users should apply mitigations or updates once available.
Potential Impact
For European organizations, the impact of CVE-2025-5001 is primarily on systems running GNU PSPP, which is commonly used in academic, research, and statistical analysis environments. The vulnerability could allow a local attacker to cause denial of service or potentially escalate privileges if combined with other exploits, disrupting critical data analysis workflows. This could affect universities, research institutions, government statistical agencies, and private sector companies relying on PSPP for data processing. Although the attack requires local access, insider threats or compromised user accounts could exploit this vulnerability. The medium severity rating suggests moderate risk, but the potential for disruption in data integrity and availability in research and analytics environments could have downstream effects on decision-making and reporting. Given the lack of remote exploitation capability, the threat is more contained but still relevant for organizations with multiple users or shared systems. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for vigilance.
Mitigation Recommendations
1. Restrict local access to systems running GNU PSPP to trusted users only, employing strict access controls and monitoring for unusual activity. 2. Implement application whitelisting and privilege separation to limit the ability of low-privilege users to execute or manipulate PSPP processes. 3. Monitor system logs and application behavior for signs of memory corruption or crashes related to PSPP usage. 4. Once patches or updates are released by the GNU project, apply them promptly to address the integer overflow vulnerability. 5. Consider running PSPP within sandboxed or containerized environments to limit the impact of potential exploitation. 6. Educate users about the risks of local exploitation and enforce strong endpoint security policies to prevent unauthorized local access. 7. Conduct regular security assessments and penetration testing focusing on local privilege escalation vectors to detect similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-20T13:11:09.270Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cf9154d7c5ea9f4b3afd3
Added to database: 5/20/2025, 9:50:13 PM
Last enriched: 7/6/2025, 5:11:21 AM
Last updated: 11/20/2025, 5:06:59 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12778: CWE-862 Missing Authorization in userelements Ultimate Member Widgets for Elementor – WordPress User Directory
MediumRCE via a malicious SVG in mPDF
MediumCVE-2025-13451: SQL Injection in SourceCodester Online Shop Project
MediumCVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project
MediumCVE-2025-13449: SQL Injection in code-projects Online Shop Project
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.