Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9396: NULL Pointer Dereference in ckolivas lrzip

0
Medium
VulnerabilityCVE-2025-9396cvecve-2025-9396
Published: Sun Aug 24 2025 (08/24/2025, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: ckolivas
Product: lrzip

Description

A security flaw has been discovered in ckolivas lrzip up to 0.651. This impacts the function __GI_____strtol_l_internal of the file strtol_l.c. Performing manipulation results in null pointer dereference. The attack is only possible with local access. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 09/01/2025, 01:07:39 UTC

Technical Analysis

CVE-2025-9396 is a medium-severity vulnerability identified in the lrzip compression tool, version 0.651 and earlier, developed by ckolivas. The flaw arises from a NULL pointer dereference in the function __GI_____strtol_l_internal within the source file strtol_l.c. This function is responsible for converting strings to long integers with locale support. The vulnerability manifests when manipulated input leads to dereferencing a NULL pointer, causing the application to crash or behave unpredictably. The attack vector requires local access with at least low privileges (PR:L) and does not require user interaction or elevated privileges. The vulnerability does not impact confidentiality, integrity, or availability beyond causing a denial of service (application crash). Exploitation is limited to local users who can execute lrzip, and no remote exploitation is possible. Although an exploit has been publicly released, there are no known widespread attacks in the wild. The CVSS 4.0 base score is 4.8, reflecting the limited scope and impact. The vulnerability is exploitable with low complexity and no authentication beyond local access, but it does not allow privilege escalation or code execution.

Potential Impact

For European organizations, the primary impact of CVE-2025-9396 is potential denial of service on systems using lrzip for compression tasks. Since lrzip is a niche compression tool optimized for large files, its usage is more common in environments dealing with large data sets, such as research institutions, media companies, and data centers. A local attacker or malicious insider could exploit this flaw to crash lrzip processes, potentially disrupting automated backup or archival workflows. However, the impact on confidentiality and integrity is minimal, and the vulnerability does not facilitate remote compromise. Organizations relying heavily on lrzip for critical data processing might experience operational interruptions, but the overall risk to European enterprises is moderate given the local access requirement and limited scope.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately update lrzip to a patched version once available from the vendor or community repositories. Since no patch links are currently provided, monitoring official sources for updates is critical. 2) Restrict local access to systems running lrzip to trusted users only, employing strict access controls and user privilege management to prevent unauthorized local exploitation. 3) Implement application whitelisting and monitoring to detect abnormal crashes or repeated failures of lrzip processes, which could indicate exploitation attempts. 4) Consider replacing lrzip with alternative compression tools that do not exhibit this vulnerability, especially in high-security environments. 5) Incorporate this vulnerability into local vulnerability management and incident response plans to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-24T14:30:10.614Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ab968cad5a09ad00425276

Added to database: 8/24/2025, 10:47:40 PM

Last enriched: 9/1/2025, 1:07:39 AM

Last updated: 10/10/2025, 4:10:58 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats