CVE-2025-60753: n/a
CVE-2025-60753 is a medium severity vulnerability in libarchive's bsdtar utility prior to version 3. 8. 1. It arises from improper handling of crafted -s substitution rules in the apply_substitution function, leading to unbounded memory allocation. This flaw can cause an Out-of-Memory (OOM) crash, resulting in a denial of service. Exploitation requires local access and user interaction, with no impact on confidentiality or integrity. No known exploits are currently in the wild. European organizations using vulnerable versions of bsdtar, especially in environments processing untrusted tar archives, may face service disruptions. Mitigation involves updating to libarchive 3. 8.
AI Analysis
Technical Summary
CVE-2025-60753 is a vulnerability identified in the libarchive project's bsdtar utility, specifically in versions before 3.8.1. The issue exists in the apply_substitution function within tar/subst.c, which processes -s substitution rules used to rewrite file names during archive extraction. When processing specially crafted substitution rules, the function can trigger unbounded memory allocation, leading to excessive consumption of system memory. This uncontrolled allocation can cause the process to crash due to an Out-of-Memory (OOM) condition, effectively resulting in a denial of service (DoS). The vulnerability is classified under CWE-835 (Loop with Unreachable Exit Condition) and CWE-400 (Uncontrolled Resource Consumption). The CVSS v3.1 base score is 5.5 (medium), with vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating that exploitation requires local access and user interaction but no privileges or authentication. The impact is limited to availability, with no confidentiality or integrity compromise. No public exploits have been reported to date. The vulnerability affects environments where bsdtar is used to process archives with substitution rules, which may include automated backup, extraction, or deployment systems. Since bsdtar is widely used in Unix-like systems, the vulnerability could affect a broad range of applications and services if unpatched.
Potential Impact
For European organizations, the primary impact of CVE-2025-60753 is the potential for denial of service due to bsdtar crashing from excessive memory allocation. This can disrupt automated processes that rely on archive extraction, such as software deployment pipelines, backup restoration, or data ingestion workflows. Organizations processing untrusted or user-supplied tar archives with substitution rules are particularly at risk. While the vulnerability does not allow data theft or modification, service interruptions can affect operational continuity and availability of critical systems. In sectors like finance, healthcare, and government, where uptime and data processing reliability are crucial, such disruptions could have significant operational and reputational consequences. Additionally, if exploited in multi-tenant environments or shared infrastructure, it could lead to broader service degradation. However, the requirement for local access and user interaction limits remote exploitation risks, reducing the threat surface for many organizations.
Mitigation Recommendations
To mitigate CVE-2025-60753, European organizations should promptly upgrade libarchive to version 3.8.1 or later, where the vulnerability has been addressed. Until patches are applied, restrict the use of bsdtar for processing archives from untrusted sources, especially those employing -s substitution rules. Implement strict input validation and sandboxing for archive extraction processes to limit resource consumption and isolate potential crashes. Monitoring system memory usage during extraction tasks can help detect abnormal behavior early. Additionally, review and harden user permissions to prevent unauthorized local access that could trigger exploitation. For automated workflows, consider alternative extraction tools that are not affected by this vulnerability or disable substitution rule processing if not required. Regularly audit and update third-party libraries to maintain security hygiene.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-60753: n/a
Description
CVE-2025-60753 is a medium severity vulnerability in libarchive's bsdtar utility prior to version 3. 8. 1. It arises from improper handling of crafted -s substitution rules in the apply_substitution function, leading to unbounded memory allocation. This flaw can cause an Out-of-Memory (OOM) crash, resulting in a denial of service. Exploitation requires local access and user interaction, with no impact on confidentiality or integrity. No known exploits are currently in the wild. European organizations using vulnerable versions of bsdtar, especially in environments processing untrusted tar archives, may face service disruptions. Mitigation involves updating to libarchive 3. 8.
AI-Powered Analysis
Technical Analysis
CVE-2025-60753 is a vulnerability identified in the libarchive project's bsdtar utility, specifically in versions before 3.8.1. The issue exists in the apply_substitution function within tar/subst.c, which processes -s substitution rules used to rewrite file names during archive extraction. When processing specially crafted substitution rules, the function can trigger unbounded memory allocation, leading to excessive consumption of system memory. This uncontrolled allocation can cause the process to crash due to an Out-of-Memory (OOM) condition, effectively resulting in a denial of service (DoS). The vulnerability is classified under CWE-835 (Loop with Unreachable Exit Condition) and CWE-400 (Uncontrolled Resource Consumption). The CVSS v3.1 base score is 5.5 (medium), with vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating that exploitation requires local access and user interaction but no privileges or authentication. The impact is limited to availability, with no confidentiality or integrity compromise. No public exploits have been reported to date. The vulnerability affects environments where bsdtar is used to process archives with substitution rules, which may include automated backup, extraction, or deployment systems. Since bsdtar is widely used in Unix-like systems, the vulnerability could affect a broad range of applications and services if unpatched.
Potential Impact
For European organizations, the primary impact of CVE-2025-60753 is the potential for denial of service due to bsdtar crashing from excessive memory allocation. This can disrupt automated processes that rely on archive extraction, such as software deployment pipelines, backup restoration, or data ingestion workflows. Organizations processing untrusted or user-supplied tar archives with substitution rules are particularly at risk. While the vulnerability does not allow data theft or modification, service interruptions can affect operational continuity and availability of critical systems. In sectors like finance, healthcare, and government, where uptime and data processing reliability are crucial, such disruptions could have significant operational and reputational consequences. Additionally, if exploited in multi-tenant environments or shared infrastructure, it could lead to broader service degradation. However, the requirement for local access and user interaction limits remote exploitation risks, reducing the threat surface for many organizations.
Mitigation Recommendations
To mitigate CVE-2025-60753, European organizations should promptly upgrade libarchive to version 3.8.1 or later, where the vulnerability has been addressed. Until patches are applied, restrict the use of bsdtar for processing archives from untrusted sources, especially those employing -s substitution rules. Implement strict input validation and sandboxing for archive extraction processes to limit resource consumption and isolate potential crashes. Monitoring system memory usage during extraction tasks can help detect abnormal behavior early. Additionally, review and harden user permissions to prevent unauthorized local access that could trigger exploitation. For automated workflows, consider alternative extraction tools that are not affected by this vulnerability or disable substitution rule processing if not required. Regularly audit and update third-party libraries to maintain security hygiene.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690b728e39a16b4c6e598bdf
Added to database: 11/5/2025, 3:51:42 PM
Last enriched: 11/12/2025, 4:19:11 PM
Last updated: 2/6/2026, 9:15:54 AM
Views: 154
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2012: SQL Injection in itsourcecode Student Management System
MediumCVE-2026-24931: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS
MediumCVE-2026-24919: CWE-787 Out-of-bounds Write in Huawei HarmonyOS
MediumCVE-2026-24917: CWE-416 Use After Free in Huawei HarmonyOS
MediumCVE-2026-24916: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Huawei HarmonyOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.