Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5899: Free of Memory not on the Heap in GNU PSPP

0
Medium
VulnerabilityCVE-2025-5899cvecve-2025-5899
Published: Mon Jun 09 2025 (06/09/2025, 22:00:15 UTC)
Source: CVE Database V5
Vendor/Project: GNU
Product: PSPP

Description

A vulnerability classified as critical was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. Affected by this vulnerability is the function parse_variables_option of the file utilities/pspp-convert.c. The manipulation leads to free of memory not on the heap. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 00:03:44 UTC

Technical Analysis

CVE-2025-5899 is a medium severity vulnerability identified in the GNU PSPP software, specifically in the parse_variables_option function within the utilities/pspp-convert.c source file. PSPP is a free software application for statistical analysis of sampled data, often used as an alternative to proprietary tools like SPSS. The vulnerability involves an incorrect memory management operation where the software attempts to free memory that was not allocated on the heap. This type of error can lead to undefined behavior, including application crashes, data corruption, or potentially exploitable conditions such as arbitrary code execution if an attacker can manipulate the memory state appropriately. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local, meaning an attacker must have some level of access to the system to exploit it. The CVSS 4.0 base score is 4.8, indicating a medium severity level, reflecting limited impact due to the local attack vector and the requirement for some privileges. No public exploits are currently known to be in the wild, but the exploit code has been disclosed publicly, increasing the risk of future exploitation. The vulnerability affects a specific commit/version of PSPP (82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb), and no patches or fixes have been linked yet. Given the nature of the flaw, exploitation could lead to denial of service or potentially privilege escalation if combined with other vulnerabilities, but the direct impact on confidentiality, integrity, and availability is limited by the local attack requirement and the medium CVSS score.

Potential Impact

For European organizations, the impact of CVE-2025-5899 depends largely on the extent to which PSPP is used within their environments. PSPP is commonly used in academic, research, and statistical analysis contexts, including universities, research institutions, and some public sector entities. A successful local exploit could cause application crashes or data corruption, potentially disrupting statistical analysis workflows and causing loss of data integrity. While the vulnerability does not directly allow remote exploitation, insider threats or compromised local accounts could leverage this flaw to destabilize systems or escalate privileges if chained with other vulnerabilities. This could be particularly impactful in environments where PSPP is integrated into automated data processing pipelines or where statistical data integrity is critical for decision-making. The lack of a patch and the public disclosure of exploit code increase the urgency for mitigation. However, the medium severity and local attack vector limit the overall risk to organizations that enforce strict access controls and user privilege management.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict local access to systems running PSPP to trusted users only, enforcing the principle of least privilege to minimize the risk of exploitation. 2) Monitor and audit local user activities on systems with PSPP installed to detect any unusual behavior that might indicate exploitation attempts. 3) Isolate PSPP usage environments, such as running PSPP in sandboxed or containerized environments, to limit the impact of potential crashes or memory corruption. 4) Regularly check for updates from the GNU PSPP project and apply patches promptly once available. 5) If feasible, consider recompiling PSPP from source with additional memory safety checks or using memory debugging tools (e.g., AddressSanitizer) during development or testing phases to detect improper memory operations early. 6) Educate local users about the risks of running untrusted code or commands that interact with PSPP to reduce the chance of accidental exploitation. 7) Implement system-level protections such as SELinux or AppArmor profiles to restrict PSPP's capabilities and limit damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-09T07:15:10.136Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68487f541b0bd07c3938a0c7

Added to database: 6/10/2025, 6:54:12 PM

Last enriched: 7/11/2025, 12:03:44 AM

Last updated: 11/22/2025, 6:18:27 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats