Skip to main content

CVE-2025-5899: Free of Memory not on the Heap in GNU PSPP

Medium
VulnerabilityCVE-2025-5899cvecve-2025-5899
Published: Mon Jun 09 2025 (06/09/2025, 22:00:15 UTC)
Source: CVE Database V5
Vendor/Project: GNU
Product: PSPP

Description

A vulnerability classified as critical was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. Affected by this vulnerability is the function parse_variables_option of the file utilities/pspp-convert.c. The manipulation leads to free of memory not on the heap. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 00:03:44 UTC

Technical Analysis

CVE-2025-5899 is a medium severity vulnerability identified in the GNU PSPP software, specifically in the parse_variables_option function within the utilities/pspp-convert.c source file. PSPP is a free software application for statistical analysis of sampled data, often used as an alternative to proprietary tools like SPSS. The vulnerability involves an incorrect memory management operation where the software attempts to free memory that was not allocated on the heap. This type of error can lead to undefined behavior, including application crashes, data corruption, or potentially exploitable conditions such as arbitrary code execution if an attacker can manipulate the memory state appropriately. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local, meaning an attacker must have some level of access to the system to exploit it. The CVSS 4.0 base score is 4.8, indicating a medium severity level, reflecting limited impact due to the local attack vector and the requirement for some privileges. No public exploits are currently known to be in the wild, but the exploit code has been disclosed publicly, increasing the risk of future exploitation. The vulnerability affects a specific commit/version of PSPP (82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb), and no patches or fixes have been linked yet. Given the nature of the flaw, exploitation could lead to denial of service or potentially privilege escalation if combined with other vulnerabilities, but the direct impact on confidentiality, integrity, and availability is limited by the local attack requirement and the medium CVSS score.

Potential Impact

For European organizations, the impact of CVE-2025-5899 depends largely on the extent to which PSPP is used within their environments. PSPP is commonly used in academic, research, and statistical analysis contexts, including universities, research institutions, and some public sector entities. A successful local exploit could cause application crashes or data corruption, potentially disrupting statistical analysis workflows and causing loss of data integrity. While the vulnerability does not directly allow remote exploitation, insider threats or compromised local accounts could leverage this flaw to destabilize systems or escalate privileges if chained with other vulnerabilities. This could be particularly impactful in environments where PSPP is integrated into automated data processing pipelines or where statistical data integrity is critical for decision-making. The lack of a patch and the public disclosure of exploit code increase the urgency for mitigation. However, the medium severity and local attack vector limit the overall risk to organizations that enforce strict access controls and user privilege management.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict local access to systems running PSPP to trusted users only, enforcing the principle of least privilege to minimize the risk of exploitation. 2) Monitor and audit local user activities on systems with PSPP installed to detect any unusual behavior that might indicate exploitation attempts. 3) Isolate PSPP usage environments, such as running PSPP in sandboxed or containerized environments, to limit the impact of potential crashes or memory corruption. 4) Regularly check for updates from the GNU PSPP project and apply patches promptly once available. 5) If feasible, consider recompiling PSPP from source with additional memory safety checks or using memory debugging tools (e.g., AddressSanitizer) during development or testing phases to detect improper memory operations early. 6) Educate local users about the risks of running untrusted code or commands that interact with PSPP to reduce the chance of accidental exploitation. 7) Implement system-level protections such as SELinux or AppArmor profiles to restrict PSPP's capabilities and limit damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-09T07:15:10.136Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68487f541b0bd07c3938a0c7

Added to database: 6/10/2025, 6:54:12 PM

Last enriched: 7/11/2025, 12:03:44 AM

Last updated: 8/12/2025, 1:30:02 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats