A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://drive.google.com/file/d/12IIt8eR591Z8O1ABOCkT_jdXSWaBxMZx/view?usp=drive_link | Exploit |
https://savannah.gnu.org/bugs/index.php?67069 | Broken Link |
https://vuldb.com/?ctiid.309652 | Permissions Required VDB Entry |
https://vuldb.com/?id.309652 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.569966 | Exploit Third Party Advisory VDB Entry |
https://www.gnu.org/ | Product |
https://savannah.gnu.org/bugs/index.php?67069 | Broken Link |
Configurations
History
17 Jun 2025, 14:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gnu:pspp:-:*:*:*:*:*:*:* | |
First Time |
Gnu
Gnu pspp |
|
References | () https://drive.google.com/file/d/12IIt8eR591Z8O1ABOCkT_jdXSWaBxMZx/view?usp=drive_link - Exploit | |
References | () https://savannah.gnu.org/bugs/index.php?67069 - Broken Link | |
References | () https://vuldb.com/?ctiid.309652 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.309652 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.569966 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.gnu.org/ - Product | |
Summary |
|
21 May 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://savannah.gnu.org/bugs/index.php?67069 - |
20 May 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-20 22:15
Updated : 2025-06-17 14:11
NVD link : CVE-2025-5001
Mitre link : CVE-2025-5001
CVE.ORG link : CVE-2025-5001
JSON object : View
Products Affected
gnu
- pspp