Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60753: n/a

0
Medium
VulnerabilityCVE-2025-60753cvecve-2025-60753
Published: Wed Nov 05 2025 (11/05/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-60753 is a medium severity vulnerability in libarchive's bsdtar utility prior to version 3. 8. 1. It arises from improper handling of crafted -s substitution rules in the apply_substitution function, leading to unbounded memory allocation. This flaw can cause an Out-of-Memory (OOM) crash, resulting in a denial of service. Exploitation requires local access and user interaction, with no impact on confidentiality or integrity. No known exploits are currently in the wild. European organizations using vulnerable versions of bsdtar, especially in environments processing untrusted tar archives, may face service disruptions. Mitigation involves updating to libarchive 3. 8.

AI-Powered Analysis

AILast updated: 11/12/2025, 16:19:11 UTC

Technical Analysis

CVE-2025-60753 is a vulnerability identified in the libarchive project's bsdtar utility, specifically in versions before 3.8.1. The issue exists in the apply_substitution function within tar/subst.c, which processes -s substitution rules used to rewrite file names during archive extraction. When processing specially crafted substitution rules, the function can trigger unbounded memory allocation, leading to excessive consumption of system memory. This uncontrolled allocation can cause the process to crash due to an Out-of-Memory (OOM) condition, effectively resulting in a denial of service (DoS). The vulnerability is classified under CWE-835 (Loop with Unreachable Exit Condition) and CWE-400 (Uncontrolled Resource Consumption). The CVSS v3.1 base score is 5.5 (medium), with vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating that exploitation requires local access and user interaction but no privileges or authentication. The impact is limited to availability, with no confidentiality or integrity compromise. No public exploits have been reported to date. The vulnerability affects environments where bsdtar is used to process archives with substitution rules, which may include automated backup, extraction, or deployment systems. Since bsdtar is widely used in Unix-like systems, the vulnerability could affect a broad range of applications and services if unpatched.

Potential Impact

For European organizations, the primary impact of CVE-2025-60753 is the potential for denial of service due to bsdtar crashing from excessive memory allocation. This can disrupt automated processes that rely on archive extraction, such as software deployment pipelines, backup restoration, or data ingestion workflows. Organizations processing untrusted or user-supplied tar archives with substitution rules are particularly at risk. While the vulnerability does not allow data theft or modification, service interruptions can affect operational continuity and availability of critical systems. In sectors like finance, healthcare, and government, where uptime and data processing reliability are crucial, such disruptions could have significant operational and reputational consequences. Additionally, if exploited in multi-tenant environments or shared infrastructure, it could lead to broader service degradation. However, the requirement for local access and user interaction limits remote exploitation risks, reducing the threat surface for many organizations.

Mitigation Recommendations

To mitigate CVE-2025-60753, European organizations should promptly upgrade libarchive to version 3.8.1 or later, where the vulnerability has been addressed. Until patches are applied, restrict the use of bsdtar for processing archives from untrusted sources, especially those employing -s substitution rules. Implement strict input validation and sandboxing for archive extraction processes to limit resource consumption and isolate potential crashes. Monitoring system memory usage during extraction tasks can help detect abnormal behavior early. Additionally, review and harden user permissions to prevent unauthorized local access that could trigger exploitation. For automated workflows, consider alternative extraction tools that are not affected by this vulnerability or disable substitution rule processing if not required. Regularly audit and update third-party libraries to maintain security hygiene.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b728e39a16b4c6e598bdf

Added to database: 11/5/2025, 3:51:42 PM

Last enriched: 11/12/2025, 4:19:11 PM

Last updated: 2/6/2026, 9:15:54 AM

Views: 154

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats