Skip to main content

CVE-2025-9396: NULL Pointer Dereference in ckolivas lrzip

Medium
VulnerabilityCVE-2025-9396cvecve-2025-9396
Published: Sun Aug 24 2025 (08/24/2025, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: ckolivas
Product: lrzip

Description

A security flaw has been discovered in ckolivas lrzip up to 0.651. This impacts the function __GI_____strtol_l_internal of the file strtol_l.c. Performing manipulation results in null pointer dereference. The attack is only possible with local access. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 08/24/2025, 23:02:48 UTC

Technical Analysis

CVE-2025-9396 is a security vulnerability identified in the ckolivas lrzip compression tool, specifically affecting version 0.651 and earlier. The flaw resides in the function __GI_____strtol_l_internal within the strtol_l.c source file. This function is responsible for converting strings to long integers with locale support. The vulnerability manifests as a NULL pointer dereference triggered by crafted input manipulation. When exploited, this causes the lrzip process to crash, resulting in a denial of service (DoS) condition. The attack requires local access and does not necessitate user interaction or elevated privileges beyond local user rights. The vulnerability has a CVSS 4.8 score, indicating a medium severity level, with an attack vector limited to local access (AV:L), low complexity (AC:L), no privileges required beyond local user (PR:L), and no user interaction (UI:N). No known exploits are reported in the wild yet, but proof-of-concept code has been publicly released, increasing the risk of exploitation. The flaw does not impact confidentiality, integrity, or availability beyond causing a process crash, and it does not allow privilege escalation or remote code execution. The vulnerability is primarily a stability and availability concern for systems running lrzip 0.651 or earlier, especially in environments where local users can execute or influence lrzip operations.

Potential Impact

For European organizations, the impact of CVE-2025-9396 is primarily related to service availability and operational stability where lrzip is used. lrzip is a compression tool favored for its efficiency in compressing large files, often used in backup, archival, or data transfer workflows. Organizations relying on lrzip for critical data processing or storage tasks may experience service interruptions or crashes if the vulnerability is exploited by local users or malicious insiders. While the vulnerability does not enable data theft or system compromise, repeated exploitation could disrupt business continuity, especially in environments with multiple users sharing systems or where untrusted users have local access. The risk is heightened in multi-user systems, shared servers, or development environments common in European research institutions, universities, and enterprises. However, the limited attack vector (local access only) reduces the threat surface compared to remote vulnerabilities. The absence of known active exploits in the wild currently limits immediate risk but the public availability of exploit code necessitates prompt mitigation to prevent potential misuse.

Mitigation Recommendations

To mitigate CVE-2025-9396, European organizations should prioritize updating lrzip to a patched version once available from the vendor or community maintaining the tool. In the absence of an official patch, organizations can implement the following practical measures: 1) Restrict local access to systems running lrzip, ensuring only trusted users have execution privileges. 2) Employ mandatory access controls (e.g., SELinux, AppArmor) to limit lrzip's ability to be invoked by unauthorized users. 3) Monitor system logs for abnormal lrzip crashes or suspicious local activity indicative of exploitation attempts. 4) Consider replacing lrzip with alternative compression tools that do not exhibit this vulnerability in critical workflows. 5) Educate system administrators and users about the risks of running untrusted code locally and enforce strict user privilege separation. 6) Implement system integrity monitoring to detect unexpected process terminations or crashes. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and operational adjustments specific to the nature of this local denial-of-service vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-24T14:30:10.614Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ab968cad5a09ad00425276

Added to database: 8/24/2025, 10:47:40 PM

Last enriched: 8/24/2025, 11:02:48 PM

Last updated: 8/26/2025, 12:34:54 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats