Skip to main content

CVE-2025-5001: Integer Overflow in GNU PSPP

Medium
VulnerabilityCVE-2025-5001cvecve-2025-5001
Published: Tue May 20 2025 (05/20/2025, 21:31:05 UTC)
Source: CVE
Vendor/Project: GNU
Product: PSPP

Description

A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/06/2025, 05:11:21 UTC

Technical Analysis

CVE-2025-5001 is an integer overflow vulnerability identified in the GNU PSPP software, specifically in the calloc function within the pspp-convert.c source file. PSPP is a free software application for statistical analysis of sampled data, often used as an alternative to proprietary tools like SPSS. The vulnerability arises from improper handling of the argument passed via the '-l' option, which leads to an integer overflow condition during memory allocation. This overflow can cause the program to allocate less memory than required, potentially leading to buffer overflows or memory corruption. Exploitation requires local access with at least low-level privileges (local privilege level) and does not require user interaction or elevated privileges. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild. The CVSS 4.0 base score is 4.8, indicating a medium severity level. The attack vector is local, with low attack complexity, no privileges required beyond local access, and no user interaction needed. The impact is limited to availability, with no direct confidentiality or integrity impact reported. This vulnerability could be leveraged by a local attacker to cause a denial of service or potentially execute arbitrary code if combined with other vulnerabilities or conditions, although no such exploitation has been confirmed. The lack of available patches at the time of disclosure suggests that users should apply mitigations or updates once available.

Potential Impact

For European organizations, the impact of CVE-2025-5001 is primarily on systems running GNU PSPP, which is commonly used in academic, research, and statistical analysis environments. The vulnerability could allow a local attacker to cause denial of service or potentially escalate privileges if combined with other exploits, disrupting critical data analysis workflows. This could affect universities, research institutions, government statistical agencies, and private sector companies relying on PSPP for data processing. Although the attack requires local access, insider threats or compromised user accounts could exploit this vulnerability. The medium severity rating suggests moderate risk, but the potential for disruption in data integrity and availability in research and analytics environments could have downstream effects on decision-making and reporting. Given the lack of remote exploitation capability, the threat is more contained but still relevant for organizations with multiple users or shared systems. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

1. Restrict local access to systems running GNU PSPP to trusted users only, employing strict access controls and monitoring for unusual activity. 2. Implement application whitelisting and privilege separation to limit the ability of low-privilege users to execute or manipulate PSPP processes. 3. Monitor system logs and application behavior for signs of memory corruption or crashes related to PSPP usage. 4. Once patches or updates are released by the GNU project, apply them promptly to address the integer overflow vulnerability. 5. Consider running PSPP within sandboxed or containerized environments to limit the impact of potential exploitation. 6. Educate users about the risks of local exploitation and enforce strong endpoint security policies to prevent unauthorized local access. 7. Conduct regular security assessments and penetration testing focusing on local privilege escalation vectors to detect similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-20T13:11:09.270Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cf9154d7c5ea9f4b3afd3

Added to database: 5/20/2025, 9:50:13 PM

Last enriched: 7/6/2025, 5:11:21 AM

Last updated: 7/30/2025, 4:08:35 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats