CVE-2025-9396: NULL Pointer Dereference in ckolivas lrzip
A security flaw has been discovered in ckolivas lrzip up to 0.651. This impacts the function __GI_____strtol_l_internal of the file strtol_l.c. Performing manipulation results in null pointer dereference. The attack is only possible with local access. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-9396 is a security vulnerability identified in the ckolivas lrzip compression tool, specifically affecting version 0.651 and earlier. The flaw resides in the function __GI_____strtol_l_internal within the strtol_l.c source file. This function is responsible for converting strings to long integers with locale support. The vulnerability manifests as a NULL pointer dereference triggered by crafted input manipulation. When exploited, this causes the lrzip process to crash, resulting in a denial of service (DoS) condition. The attack requires local access and does not necessitate user interaction or elevated privileges beyond local user rights. The vulnerability has a CVSS 4.8 score, indicating a medium severity level, with an attack vector limited to local access (AV:L), low complexity (AC:L), no privileges required beyond local user (PR:L), and no user interaction (UI:N). No known exploits are reported in the wild yet, but proof-of-concept code has been publicly released, increasing the risk of exploitation. The flaw does not impact confidentiality, integrity, or availability beyond causing a process crash, and it does not allow privilege escalation or remote code execution. The vulnerability is primarily a stability and availability concern for systems running lrzip 0.651 or earlier, especially in environments where local users can execute or influence lrzip operations.
Potential Impact
For European organizations, the impact of CVE-2025-9396 is primarily related to service availability and operational stability where lrzip is used. lrzip is a compression tool favored for its efficiency in compressing large files, often used in backup, archival, or data transfer workflows. Organizations relying on lrzip for critical data processing or storage tasks may experience service interruptions or crashes if the vulnerability is exploited by local users or malicious insiders. While the vulnerability does not enable data theft or system compromise, repeated exploitation could disrupt business continuity, especially in environments with multiple users sharing systems or where untrusted users have local access. The risk is heightened in multi-user systems, shared servers, or development environments common in European research institutions, universities, and enterprises. However, the limited attack vector (local access only) reduces the threat surface compared to remote vulnerabilities. The absence of known active exploits in the wild currently limits immediate risk but the public availability of exploit code necessitates prompt mitigation to prevent potential misuse.
Mitigation Recommendations
To mitigate CVE-2025-9396, European organizations should prioritize updating lrzip to a patched version once available from the vendor or community maintaining the tool. In the absence of an official patch, organizations can implement the following practical measures: 1) Restrict local access to systems running lrzip, ensuring only trusted users have execution privileges. 2) Employ mandatory access controls (e.g., SELinux, AppArmor) to limit lrzip's ability to be invoked by unauthorized users. 3) Monitor system logs for abnormal lrzip crashes or suspicious local activity indicative of exploitation attempts. 4) Consider replacing lrzip with alternative compression tools that do not exhibit this vulnerability in critical workflows. 5) Educate system administrators and users about the risks of running untrusted code locally and enforce strict user privilege separation. 6) Implement system integrity monitoring to detect unexpected process terminations or crashes. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and operational adjustments specific to the nature of this local denial-of-service vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2025-9396: NULL Pointer Dereference in ckolivas lrzip
Description
A security flaw has been discovered in ckolivas lrzip up to 0.651. This impacts the function __GI_____strtol_l_internal of the file strtol_l.c. Performing manipulation results in null pointer dereference. The attack is only possible with local access. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-9396 is a security vulnerability identified in the ckolivas lrzip compression tool, specifically affecting version 0.651 and earlier. The flaw resides in the function __GI_____strtol_l_internal within the strtol_l.c source file. This function is responsible for converting strings to long integers with locale support. The vulnerability manifests as a NULL pointer dereference triggered by crafted input manipulation. When exploited, this causes the lrzip process to crash, resulting in a denial of service (DoS) condition. The attack requires local access and does not necessitate user interaction or elevated privileges beyond local user rights. The vulnerability has a CVSS 4.8 score, indicating a medium severity level, with an attack vector limited to local access (AV:L), low complexity (AC:L), no privileges required beyond local user (PR:L), and no user interaction (UI:N). No known exploits are reported in the wild yet, but proof-of-concept code has been publicly released, increasing the risk of exploitation. The flaw does not impact confidentiality, integrity, or availability beyond causing a process crash, and it does not allow privilege escalation or remote code execution. The vulnerability is primarily a stability and availability concern for systems running lrzip 0.651 or earlier, especially in environments where local users can execute or influence lrzip operations.
Potential Impact
For European organizations, the impact of CVE-2025-9396 is primarily related to service availability and operational stability where lrzip is used. lrzip is a compression tool favored for its efficiency in compressing large files, often used in backup, archival, or data transfer workflows. Organizations relying on lrzip for critical data processing or storage tasks may experience service interruptions or crashes if the vulnerability is exploited by local users or malicious insiders. While the vulnerability does not enable data theft or system compromise, repeated exploitation could disrupt business continuity, especially in environments with multiple users sharing systems or where untrusted users have local access. The risk is heightened in multi-user systems, shared servers, or development environments common in European research institutions, universities, and enterprises. However, the limited attack vector (local access only) reduces the threat surface compared to remote vulnerabilities. The absence of known active exploits in the wild currently limits immediate risk but the public availability of exploit code necessitates prompt mitigation to prevent potential misuse.
Mitigation Recommendations
To mitigate CVE-2025-9396, European organizations should prioritize updating lrzip to a patched version once available from the vendor or community maintaining the tool. In the absence of an official patch, organizations can implement the following practical measures: 1) Restrict local access to systems running lrzip, ensuring only trusted users have execution privileges. 2) Employ mandatory access controls (e.g., SELinux, AppArmor) to limit lrzip's ability to be invoked by unauthorized users. 3) Monitor system logs for abnormal lrzip crashes or suspicious local activity indicative of exploitation attempts. 4) Consider replacing lrzip with alternative compression tools that do not exhibit this vulnerability in critical workflows. 5) Educate system administrators and users about the risks of running untrusted code locally and enforce strict user privilege separation. 6) Implement system integrity monitoring to detect unexpected process terminations or crashes. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and operational adjustments specific to the nature of this local denial-of-service vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-24T14:30:10.614Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ab968cad5a09ad00425276
Added to database: 8/24/2025, 10:47:40 PM
Last enriched: 8/24/2025, 11:02:48 PM
Last updated: 8/26/2025, 12:34:54 AM
Views: 7
Related Threats
CVE-2025-9443: Buffer Overflow in Tenda CH22
HighCVE-2025-9440: Cross Site Scripting in 1000projects Online Project Report Submission and Evaluation System
MediumCVE-2025-9439: Cross Site Scripting in 1000projects Online Project Report Submission and Evaluation System
MediumCVE-2025-9438: Cross Site Scripting in 1000projects Online Project Report Submission and Evaluation System
MediumCVE-2025-8447: CWE-639 Authorization Bypass Through User-Controlled Key in GitHub Enterprise Server
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.